CompTIA N+ N10-009 Mock Test 3 Revision

CompTIA N+ N10-009 Mock Test 3 Revision

University

59 Qs

quiz-placeholder

Similar activities

Quiz Pengantar Teknologi Informasi

Quiz Pengantar Teknologi Informasi

University

60 Qs

TRY OUT 2 KLS 9

TRY OUT 2 KLS 9

9th Grade - University

60 Qs

OOP- Quiz #1

OOP- Quiz #1

University

55 Qs

Câu hỏi ôn tập đầu giờ ERP

Câu hỏi ôn tập đầu giờ ERP

University

56 Qs

Quiz 04 - Applied OS

Quiz 04 - Applied OS

University

60 Qs

Mạng máy tính Bài 1

Mạng máy tính Bài 1

University

62 Qs

Software Testing Techniques Quiz

Software Testing Techniques Quiz

University

55 Qs

Analisis Data Kelas 8

Analisis Data Kelas 8

8th Grade - University

58 Qs

CompTIA N+ N10-009 Mock Test 3 Revision

CompTIA N+ N10-009 Mock Test 3 Revision

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Tshepo Mofokeng

Used 1+ times

FREE Resource

59 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT one of the three main goals of computer security as remembered by the CIA triad?

Confidentiality

Compliance

Integrity

Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What term describes a weakness in a system-like an unlocked door-that could let someone cause harm, whether by accident or on purpose?

Threat

Risk

Vulnerability

Exploit

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the chance that someone or something might take advantage of that weakness to cause damage?

Vulnerability

Threat

Risk

Attack Vector

4.

MULTIPLE CHOICE QUESTION

30 sec • 12 pts

The person or thing causing the threat is called a/an:

Attack vector

Vulnerability actor

Risk agent

Threat actor

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of spotting possible problems (like weaknesses or threats), figuring out how serious they are, and deciding how to deal with them?

Security Audit

Posture Assessment

Process Assessment

Risk Management

6.

MULTIPLE CHOICE QUESTION

30 sec • 8 pts

Improving a system's security is called:

Hardening

Compliance

Assessment

Auditing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is any data that can identify a person-like their name, ID number, phone number, or address?

Confidential Information

Personal Information

Sensitive Data

Personally Identifiable Information (PII)

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?