Cyberspace Principles Course
  • Introduction
  • Table of Contents
    • Introduction
    • Cybersecurity Concepts
      • Quiz
    • Principles of Cryptography
      • Quiz
    • Threats in Cyberspace
      • Quiz
    • Crime and Abuse in Cyberspace
      • Quiz
    • Conduct and Ethics in a Digital World
      • Quiz
    • Code of Ethics
Powered by GitBook
On this page
  1. Table of Contents
  2. Cybersecurity Concepts

Quiz

What is the cyclical process that Defensive Cyber Operators use to defend their networks?

  1. Detect, Prevent, Respond

  2. Harden, Find, Kick out

  3. Prevent, Detect, Respond

  4. Observe, Orient, Decide, Act

Which is not a control we use in Information Assurance?

  1. Physical

  2. Confidentiality

  3. Technical

  4. Administrative

What does the "A" in the "CIA Triad" stand for?

  1. Authentication

  2. Authorization

  3. Availability

  4. Access

In order for Charlie to access the ACME Corporations web server, he must enter his username and password in order to ________ himself?

  1. Authorize

  2. Achieve

  3. Access

  4. Authenticate

PreviousCybersecurity ConceptsNextPrinciples of Cryptography

Last updated 7 years ago