Cybersecurity Fundamentals Quiz

UseableMinotaur avatar
UseableMinotaur
·
·
Download

Start Quiz

Study Flashcards

30 Questions

Which of the following is not a term that is part of the history of cybersecurity?

whizbanger

Which of the following is the best definition of cybersecurity?

The protection of information in all of its forms, wherever it may exist, through the application of good security practices.

Which of the following is not one of the identified good security practices?

cybersecurity programming

What are events or circumstances that have the potential to adversely affect operations and assets?

threats

A person who accesses systems and information without authorization and often illegally is called a(n) _______.

hacker

Which of the following is not one of the three core characteristics of information that give it value?

database

What is the term for a threat that represents a situation where we must rely on technology that cannot be easily replaced?

technological obsolescence

What is the aspect of controlling data access that is NOT one of the four main aspects?

analyze

Who is responsible for storing, maintaining, and protecting information?

data custodians

What type of control is intended to discourage or suppress a possible incident?

deterrent

What type of device regulates the movement of information across networks from the outside world?

firewall

What is a false alarm triggered by an IDPS called?

false positive

What is a software program or hardware appliance that can intercept, copy, and interpret network traffic?

Network protocol analyzer

What is the strategy where an organization decides that an asset is not worth fixing or protecting and removes it?

Acceptance

When a vendor delivers a fix for something that’s not working as it should, it is called a(n) _____.

Patch

Who has primary responsibility for the assessment, management, and implementation of information security in the organization?

Chief Information Security Officer (CISO)

What type of social engineering attack involves emails or phone calls to trick individuals out of information?

Phishing

What is the term for when an adversary steals information and then tries to blackmail the victim into paying for its return?

Information Extortion

What is a senior executive who promotes a project and ensures its support, both financially and administratively, at the highest levels of the organization?

Champion

A good cybersecurity program maintains a careful balance between _____.

Access and Security

What type of threat includes malware such as viruses, worms, and macros, as well as denial of service attacks and script injections?

Software Attacks

What is the term for malicious software elements designed to infect a user’s computer and either steal information or damage the computer?

Viruses and Worms

What is the term for an attack that attempts to overwhelm a computer target’s ability to handle incoming communications?

Denial of Service

What is the term for an attack in which an attacker intercepts a communications stream between two users or systems and inserts himself in the conversation?

A Man-in-the-Middle

What is the term for a situation where technology equipment fails due to various reasons?

technical hardware failure

What is the term for a situation where programming or operating systems fail due to various reasons?

technical software failure

What is the term for a situation where we must rely on technology that cannot be easily replaced?

technological obsolescence

What is the principle of limiting users' access to only the specific information required to perform their assigned jobs?

need-to-know

What is the principle of limiting users' access so that authorized individuals should only have the minimum data access and use rights necessary?

least privilege

Who is/are the individual or group that creates or is responsible for a set of information?

owner

Test your knowledge of cybersecurity basics, including its history, definitions, and concepts. Identify key terms and understand the scope of cybersecurity.

Make Your Own Quizzes and Flashcards

Convert your notes into interactive study material.

Get started for free

More Quizzes Like This

Use Quizgecko on...
Browser
Browser