Security+ Chapter 1
Self-assessment Quiz for Security+ Chapter 1
Start
Congratulations - you have completed Security+ Chapter 1.
You scored %%SCORE%% out of %%TOTAL%%.
Your answers are highlighted below.
Question 1 |
What is a weakness or lack of safeguard that could allow something you value to be compromised?
A | Target of opportunity |
B | Risk |
C | Vulnerability |
D | Threat agent |
Question 2 |
What is a person or thing that has the power to carry out a threat?
A | Asset |
B | Threat agent |
C | Vulnerability |
D | Risk |
Question 3 |
___________ ensures that only those you wish to view information are able to view the information?
A | Availability |
B | Confidentiality |
C | Integrity |
D | Non-repudiation |
Question 4 |
_______ is the generic term for anyone who tries to illegally break into a computer system?
A | Cybercriminal |
B | Script kiddie |
C | Hacker |
D | Cyberterrorist |
Question 4 Explanation:
Cybercriminal would be a correct answer if it was not for the "generic" stipulation.
Question 5 |
Which of the following is not a tenant of security?
A | Authentication |
B | Confidentiality |
C | Availability |
D | Integrity |
Question 6 |
________ involves using someone's personal information to establish bank and credit card accounts?
A | Data diddling |
B | Identity theft |
C | Vulnerability exploitation |
D | Risk avoidance |
Question 7 |
Security can be considered a state of freedom from danger or risk.
A | False |
B | True |
Question 8 |
A __________ is a person who is hired to break into a computer and steal information.
A | Hacker |
B | Script kiddie |
C | Spy |
D | Phreaker |
Question 9 |
What is an event or object that may defeat the security measures you have in place?
A | Threat |
B | Vulnerability |
C | Asset |
D | Risk |
Question 10 |
What is the likelihood a threat agent will exploit a vulnerability?
A | Exploitation likelihood |
B | Risk |
C | Threat |
D | Asset |
Question 11 |
Why has information security (INFOSEC) become increasingly difficult?
A | Complex attacks can be achieved through easy to use GUI based tools |
B | Laws have become more lenient |
C | More people have become Security+ certified |
D | Script kiddie tools have become harder to use |
Question 12 |
________ ensures that data has not been changed during transmission.
A | Confidentiality |
B | Integrity |
C | Availability |
D | Authentication |
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results
There are 12 questions to complete.
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!