Search Header Logo

Mod 2 Risk Adversity Trust

Authored by Wayground Content

Computers

9th Grade

Used 16+ times

Mod 2 Risk Adversity Trust
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

User error resulting in the access to, modification of, and disclosure confidential information assets represents a loss of:

Confidentiality

Confidentiality and Integrity

Availability and Integrity

Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and the additional safeguards that mitigate this impact is known as:

CIA Triad

Risk Assessment

Incident Response

Risk Matrix

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?

Threat

Vulnerability

Attack

Exploit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Human error resulting in a loss of confidentiality, integrity, or availability to an information resource is known as a:

Threat

Vulnerability

Attack

Exploit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or false? Cybersecurity is a “hard problem” because cyberspace is large, interconnected, and complex.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the purpose of a data classification system for cybersecurity?

To ensure filenames are compliant with the naming policy rules

To identify information assets and protect them from a loss of confidentiality, integrity and availability

To describe all possible vulnerabilities in the system

To initiate a threat assessment protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fire, flood, or an adverse weather event impacting the security of information assets is known as a:

Threat

Bug

Attack

Exploit

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?