0% found this document useful (0 votes)
1K views2 pages

Quiz - Introduction To Cybersecurity - Attempt Review

The document is a summary of the user's completion of an introduction to threat landscape self-paced course. It provides information on the date and time completed, score and feedback. It then lists 8 multiple choice questions from the course along with the user's responses and whether they were correct or incorrect. The questions cover topics related to definitions of authentication, cybersecurity, information systems security and categories/elements of cybersecurity.

Uploaded by

Ponce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views2 pages

Quiz - Introduction To Cybersecurity - Attempt Review

The document is a summary of the user's completion of an introduction to threat landscape self-paced course. It provides information on the date and time completed, score and feedback. It then lists 8 multiple choice questions from the course along with the user's responses and whether they were correct or incorrect. The questions cover topics related to definitions of authentication, cybersecurity, information systems security and categories/elements of cybersecurity.

Uploaded by

Ponce
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

 FCF - Introduction to the Threat Landscape 2.

0 Self-Paced

Started on Sunday, December 24, 2023, 8:37 PM


State Finished
Completed on Sunday, December 24, 2023, 8:53 PM
Time taken 16 mins 28 secs
Points 5/8
Grade 63 out of 100
Feedback I'm sorry, you did not passed.

Question 1 Which is the most accurate definition of authentication in cybersecurity?


Correct

1 points out of 1 Select one:


The practice of verifying activities on computer devices
The act of certifying that someone can perform an action
The process of controlling access to resource
The act of identifying and verifying a person or thing

Question 2 Which definition accurately describes cybersecurity?


Correct

1 points out of 1 Select one:


The protection of all information that has been deemed sensitive
The practice of protecting computer networks, devices, and digital information
The management of critical infrastructure, such as pipelines and electrical power grids
The protection of information systems against unauthorized access, modification, and so on

Question 3 In addition to the five categories of cybersecurity, what else do you need to consider when defending the cyber space?
Correct

1 points out of 1 Select one:


Executive strategic planning
Computer code
People and processes
ISO standards

Question 4 Which definition accurately describes information systems security?


Incorrect

0 points out of 1 Select one:


The control of physical access to a building or room where sensitive data is stored
The management of information systems, including disaster recovery (DR) and high availability (HA) 
The practice of protecting computer networks, devices, and digital information
The protection of information systems against unauthorized access, modification, and so on
Question 5 Which cybersecurity term does one of the letters in AAA stand for?
Correct

1 points out of 1 Select one:


Anonymity
Alerts
Accounting
Acceptability

Question 6 What are two categories of cybersecurity? (Choose two.)


Correct

1 points out of 1 Select one or more:


Building access security
Network security
Security accreditation for employees
Critical infrastructure

Question 7 Which two elements of cybersecurity must be addressed when defending computer networks? (Choose two.)
Incorrect

0 points out of 1 Select one or more:


Physical access points 
Computer technology vulnerabilities
Information left on desks or in public places
Human behavior

Question 8 Which definition accurately describes information security (InfoSec)?


Incorrect

0 points out of 1 Select one:


The control of physical access to a building or room where sensitive data is stored, either digitally or physically.
The management of critical infrastructure, such as pipelines, electrical power grids, and data centers in the cloud.
The practice of protecting computer networks, devices, and digital information, whether on-premises or in the 
cloud.
The processes for preventing, detecting, and remediating attacks on sensitive information, both digital and physical.

You might also like