Cybersecurity Definitions Quiz
12 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the definition of vulnerabilities in the context of security?

  • Actively steering clear of certain risks or situations
  • The combination of threats and vulnerabilities
  • Weaknesses in a system's security that can be exploited by threats (correct)
  • Shifting the responsibility for managing a risk to a third party
  • Which risk management strategy involves accepting a risk as-is due to the high cost of addressing it?

  • Transfer
  • Acceptance (correct)
  • Policy
  • Avoidance
  • What do we call the rules and limitations set by an organization to guide behavior and decision-making related to security?

  • Standard (correct)
  • Definitions
  • Malwares
  • Risks
  • In the context of security, what does transferring a risk involve?

    <p>Shifting the responsibility for managing a risk to a third party</p> Signup and view all the answers

    Which term refers to potential dangers or risks to a system or organization's security?

    <p>Threats</p> Signup and view all the answers

    What is the definition of 'risks' in the context of security?

    <p>The combination of threats and vulnerabilities</p> Signup and view all the answers

    What does the term 'Five Nine' refer to in IT systems?

    <p>99.999% availability</p> Signup and view all the answers

    Which phase of incident response involves minimizing damage and restoring normal operations after a security breach?

    <p>Containment, Eradication, and Recovery</p> Signup and view all the answers

    What does the term 'BYOD' stand for in an organizational context?

    <p>Bring Your Own Device</p> Signup and view all the answers

    Which of the following is NOT a factor in the 'Three Fundamental Principles of Information Security'?

    <p>Privacy</p> Signup and view all the answers

    What is the purpose of 'Data Wipe' in information security?

    <p>Data deletion</p> Signup and view all the answers

    Which of the following is an example of 'Something you are' in the context of authentication?

    <p>Biometrics (fingerprint)</p> Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser