
CompTIA N+ N10-009 Mock Test 3 Revision
Authored by Tshepo Mofokeng
Information Technology (IT)
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
59 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT one of the three main goals of computer security as remembered by the CIA triad?
Confidentiality
Compliance
Integrity
Availability
2.
MULTIPLE CHOICE QUESTION
30 sec • 10 pts
What term describes a weakness in a system-like an unlocked door-that could let someone cause harm, whether by accident or on purpose?
Threat
Risk
Vulnerability
Exploit
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the chance that someone or something might take advantage of that weakness to cause damage?
Vulnerability
Threat
Risk
Attack Vector
4.
MULTIPLE CHOICE QUESTION
30 sec • 12 pts
The person or thing causing the threat is called a/an:
Attack vector
Vulnerability actor
Risk agent
Threat actor
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of spotting possible problems (like weaknesses or threats), figuring out how serious they are, and deciding how to deal with them?
Security Audit
Posture Assessment
Process Assessment
Risk Management
6.
MULTIPLE CHOICE QUESTION
30 sec • 8 pts
Improving a system's security is called:
Hardening
Compliance
Assessment
Auditing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is any data that can identify a person-like their name, ID number, phone number, or address?
Confidential Information
Personal Information
Sensitive Data
Personally Identifiable Information (PII)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?