Cybersecurity Definitions Quiz

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Listen to an AI-generated conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the definition of vulnerabilities in the context of security?

  • Actively steering clear of certain risks or situations
  • The combination of threats and vulnerabilities
  • Weaknesses in a system's security that can be exploited by threats (correct)
  • Shifting the responsibility for managing a risk to a third party

Which risk management strategy involves accepting a risk as-is due to the high cost of addressing it?

  • Transfer
  • Acceptance (correct)
  • Policy
  • Avoidance

What do we call the rules and limitations set by an organization to guide behavior and decision-making related to security?

  • Standard (correct)
  • Definitions
  • Malwares
  • Risks

In the context of security, what does transferring a risk involve?

<p>Shifting the responsibility for managing a risk to a third party (C)</p>
Signup and view all the answers

Which term refers to potential dangers or risks to a system or organization's security?

<p>Threats (B)</p>
Signup and view all the answers

What is the definition of 'risks' in the context of security?

<p>The combination of threats and vulnerabilities (A)</p>
Signup and view all the answers

What does the term 'Five Nine' refer to in IT systems?

<p>99.999% availability (D)</p>
Signup and view all the answers

Which phase of incident response involves minimizing damage and restoring normal operations after a security breach?

<p>Containment, Eradication, and Recovery (B)</p>
Signup and view all the answers

What does the term 'BYOD' stand for in an organizational context?

<p>Bring Your Own Device (B)</p>
Signup and view all the answers

Which of the following is NOT a factor in the 'Three Fundamental Principles of Information Security'?

<p>Privacy (A)</p>
Signup and view all the answers

What is the purpose of 'Data Wipe' in information security?

<p>Data deletion (A)</p>
Signup and view all the answers

Which of the following is an example of 'Something you are' in the context of authentication?

<p>Biometrics (fingerprint) (D)</p>
Signup and view all the answers

Flashcards are hidden until you start studying

Use Quizgecko on...
Browser
Browser