intro to cs

intro to cs

University

10 Qs

quiz-placeholder

Similar activities

MAIN 1 Quiz #3: Sustainability in Construction

MAIN 1 Quiz #3: Sustainability in Construction

University

15 Qs

Topologias

Topologias

University

10 Qs

CE423: CE LAW QUIZ No. 1

CE423: CE LAW QUIZ No. 1

University

13 Qs

Quiz 2 - Comm Tech & Cyber Security

Quiz 2 - Comm Tech & Cyber Security

University

15 Qs

HackHarbor : Day 2(Tech)

HackHarbor : Day 2(Tech)

University

10 Qs

S.T.A.R.T: Chemical Catalytic Reaction

S.T.A.R.T: Chemical Catalytic Reaction

University

10 Qs

Clipper Circuits Quiz

Clipper Circuits Quiz

University

11 Qs

Surprise Quiz - I - SIE -25-26

Surprise Quiz - I - SIE -25-26

University

10 Qs

intro to cs

intro to cs

Assessment

Quiz

Engineering

University

Practice Problem

Hard

Created by

Trainer T

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes a vulnerability?

An intentional attack on a system

A weakness in a system that could be exploited

The act of exploiting a system

A backup control measure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The CIA triad stands for:

Confidentiality, Integrity, Access

Cyber, Internet, Authentication

Confidentiality, Integrity, Availability

Control, Identification, Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is primarily an availability attack?

SQL injection

Password theft

Data breach of credit cards

DDoS attack

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which property is most impacted if hackers alter patient medical records?

Confidentiality

Integrity

Availability

Authentication

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The use of stolen credentials in web app attacks (~88% of cases in 2025 DBIR) is an example of which concept?

Vulnerability

Threat

Exploit

Mitigation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cyber attack brought down airport check-in systems in Europe in 2025

SQL injection

Ransomware

Drive-by download

Phishing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a cyber security control type?

Physical

Technical

Administrative

Financial

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?