Search Header Logo

Itelect1 Pre-Test 2

Authored by Emilio Macaso

Computers

University

Used 1+ times

Itelect1 Pre-Test 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a threat in the context of cybersecurity?

A flaw in a system

A potential cause of an unwanted incident

A strong security measure

A physical firewall

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a vulnerability?

An antivirus update

A system's strength

A weakness that can be exploited

A backup file

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a safeguard?

Malware

Backup policy

Unpatched software

Threat actor

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a technical control?

Security policy

Employee handbook

Firewall

Ethics training

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following represents a physical control?

Password policy

CCTV cameras

Antivirus software

Encryption algorithm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A risk arises when:

There are no threats

There are no assets

A threat exploits a vulnerability

A safeguard is applied

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a common vulnerability in web applications?

Phishing

Cross-site scripting (XSS)

Brute-force attack

Backup failure

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?