Search Header Logo

intro to cs

Authored by Trainer T

Engineering

University

Used 3+ times

intro to cs
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes a vulnerability?

An intentional attack on a system

A weakness in a system that could be exploited

The act of exploiting a system

A backup control measure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The CIA triad stands for:

Confidentiality, Integrity, Access

Cyber, Internet, Authentication

Confidentiality, Integrity, Availability

Control, Identification, Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is primarily an availability attack?

SQL injection

Password theft

Data breach of credit cards

DDoS attack

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which property is most impacted if hackers alter patient medical records?

Confidentiality

Integrity

Availability

Authentication

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The use of stolen credentials in web app attacks (~88% of cases in 2025 DBIR) is an example of which concept?

Vulnerability

Threat

Exploit

Mitigation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cyber attack brought down airport check-in systems in Europe in 2025

SQL injection

Ransomware

Drive-by download

Phishing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a cyber security control type?

Physical

Technical

Administrative

Financial

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?