lec2

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which type of control is used to protect an asset from a threat?

  • Anti-virus software
  • Security control (correct)
  • Network Device
  • Data Base Management System

What is the purpose of Risk Assessment in Risk Management?

  • To identify and prioritize threats (correct)
  • To evaluate the likelihood of a threat
  • To take action against a threat
  • To predict the future

Who is responsible for evaluating the asset in Risk Assessment?

  • The software developer
  • The security team
  • The owner of the asset (correct)
  • The management

What is the relationship between Asset, Threat, and Risk?

<p>Risk is a combination of Asset and Threat (C)</p> Signup and view all the answers

What is the purpose of a strong security control?

<p>To reduce the likelihood of a threat (C)</p> Signup and view all the answers

What is the result of a successful Risk Assessment?

<p>Prioritization of threats (B)</p> Signup and view all the answers

What type of malware is a worm?

<p>A type of virus (B)</p> Signup and view all the answers

What is the purpose of a Threat Actor?

<p>To perform a threat (C)</p> Signup and view all the answers

What is the primary axis in the risk matrix?

<p>Likelihood (B)</p> Signup and view all the answers

What is the term for the level of risk determined by the intersection of the impact and likelihood axes?

<p>Level of Risk (A)</p> Signup and view all the answers

What is the purpose of the risk matrix?

<p>To prioritize risks based on their impact and likelihood (D)</p> Signup and view all the answers

What is the term for the measure of the potential harm or loss caused by a risk?

<p>Impact (D)</p> Signup and view all the answers

What is the name of the operating system mentioned in the text?

<p>Windows (B)</p> Signup and view all the answers

What is the term for the process of evaluating and prioritizing risks?

<p>Risk Assessment (C)</p> Signup and view all the answers

What is the primary goal of a ransomware attack?

<p>To extort money from the victim (C)</p> Signup and view all the answers

What is a backdoor in the context of cybersecurity?

<p>A secret access point in a system or network (A)</p> Signup and view all the answers

What is social engineering in the context of cybersecurity?

<p>The use of psychological manipulation to trick users (D)</p> Signup and view all the answers

What is the primary purpose of encryption in cybersecurity?

<p>To protect data from unauthorized access (D)</p> Signup and view all the answers

What is a common goal of hackers launching a Denial of Service (DoS) attack?

<p>To disrupt system operations (A)</p> Signup and view all the answers

What is phishing in the context of cybersecurity?

<p>A scam where attackers pose as trusted entities (A)</p> Signup and view all the answers

What is the main difference between a virus and a worm?

<p>A virus requires user interaction, while a worm does not (D)</p> Signup and view all the answers

What is a common tactic used by hackers to gain unauthorized access to systems?

<p>Exploiting system vulnerabilities (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Use Quizgecko on...
Browser
Browser