10 Questions
What is the main purpose of disaster recovery?
Planning and procedures for restoring operations after a major outage or disruption
Which of the following is a detective control?
Intrusion detection systems
What is the purpose of vulnerability scanning?
Identifying and addressing weaknesses in systems before they can be exploited
What does risk assessment involve?
Identifying, analyzing, and evaluating potential security risks
What is the role of policy enforcement?
Implementing mechanisms to monitor and enforce compliance with security policies
What is defined as protection against harm, unauthorized access, or loss of valuable assets?
Security
Which of the following represents weaknesses in systems, processes, or practices that can be exploited by threats?
Vulnerabilities
What technology transforms data into an unreadable format to ensure confidentiality?
Encryption
Which of the following represents potential actors or events that can exploit vulnerabilities and cause harm?
Threats
What category of vulnerabilities includes unsecured Wi-Fi, open ports, weak passwords, and configuration errors?
Network vulnerabilities
Test your knowledge of the basic concepts of security, including protection against harm, threats, vulnerabilities, and different types of cyber and physical threats.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free