lec2
22 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which type of control is used to protect an asset from a threat?

  • Anti-virus software
  • Security control (correct)
  • Network Device
  • Data Base Management System

What is the purpose of Risk Assessment in Risk Management?

  • To identify and prioritize threats (correct)
  • To evaluate the likelihood of a threat
  • To take action against a threat
  • To predict the future

Who is responsible for evaluating the asset in Risk Assessment?

  • The software developer
  • The security team
  • The owner of the asset (correct)
  • The management

What is the relationship between Asset, Threat, and Risk?

<p>Risk is a combination of Asset and Threat (C)</p> Signup and view all the answers

What is the purpose of a strong security control?

<p>To reduce the likelihood of a threat (C)</p> Signup and view all the answers

What is the result of a successful Risk Assessment?

<p>Prioritization of threats (B)</p> Signup and view all the answers

What type of malware is a worm?

<p>A type of virus (B)</p> Signup and view all the answers

What is the purpose of a Threat Actor?

<p>To perform a threat (C)</p> Signup and view all the answers

What is the primary axis in the risk matrix?

<p>Likelihood (B)</p> Signup and view all the answers

What is the term for the level of risk determined by the intersection of the impact and likelihood axes?

<p>Level of Risk (A)</p> Signup and view all the answers

What is the purpose of the risk matrix?

<p>To prioritize risks based on their impact and likelihood (D)</p> Signup and view all the answers

What is the term for the measure of the potential harm or loss caused by a risk?

<p>Impact (D)</p> Signup and view all the answers

What is the name of the operating system mentioned in the text?

<p>Windows (B)</p> Signup and view all the answers

What is the term for the process of evaluating and prioritizing risks?

<p>Risk Assessment (C)</p> Signup and view all the answers

What is the primary goal of a ransomware attack?

<p>To extort money from the victim (C)</p> Signup and view all the answers

What is a backdoor in the context of cybersecurity?

<p>A secret access point in a system or network (A)</p> Signup and view all the answers

What is social engineering in the context of cybersecurity?

<p>The use of psychological manipulation to trick users (D)</p> Signup and view all the answers

What is the primary purpose of encryption in cybersecurity?

<p>To protect data from unauthorized access (D)</p> Signup and view all the answers

What is a common goal of hackers launching a Denial of Service (DoS) attack?

<p>To disrupt system operations (A)</p> Signup and view all the answers

What is phishing in the context of cybersecurity?

<p>A scam where attackers pose as trusted entities (A)</p> Signup and view all the answers

What is the main difference between a virus and a worm?

<p>A virus requires user interaction, while a worm does not (D)</p> Signup and view all the answers

What is a common tactic used by hackers to gain unauthorized access to systems?

<p>Exploiting system vulnerabilities (D)</p> Signup and view all the answers
Use Quizgecko on...
Browser
Browser