0 of 15 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
1. A cyber security risk assessment is the process of identifying, analyzing, and _____________ risk.
2. Host-based ____________ are used to locate and identify vulnerabilities in servers, workstations, or other network hosts.
3. ______________ assessment refers to the process of identifying risks and vulnerabilities in computer networks, systems, hardware, and applications.
4. Wireless __________ assessment is used to scan Wi Fi networks and attack vectors in the wireless network infrastructure.
5. Pen Testing is a type of Security Testing used to cover vulnerabilities, threats, and __________ that an attacker could exploit in software applications, networks, or web applications.
6. In a white box penetration testing, the tester is usually provided with _____________ information about the network or systems to be tested.
7. In ___________ penetration testing, a tester does not know the systems tested.
8. _____________ is the process of developing, adding, and testing security features within applications to prevent security vulnerabilities against threats.
9. When developers include protocols in an application to ensure that only authorized users have access to it. It is known as ____________.
10. If a security breach occurs in an application, __________ can assist in determining who gained access to the data and how they did so.
11. _____________ security can include permanent assets such as real estate, but it is most commonly used to refer to technology assets, including computers.
12. ______________ is the term used for a broad range of malicious activities accomplished through human interactions.
13. __________ is a type of social engineering where an attacker leaves a physical device infected with a type of malware where it’s most likely to be found.
14. _____________ is specifically an email spoofing attack targeting a specific organization or individual.
15. _____________ is a form of spear phishing targeting high-profile individuals like public company executives, politicians or celebrities.