Questions
The following is a short list of review questions to help reinforce your learning and help you identify areas that may require some improvement:
- Which of the following is responsible for ensuring authorized users have access to data?
A. Availability
B. Integrity
C. Confidentiality
D. All of the above
- Which of the following prevents users from accessing a web server on the internet?
A. Ransomware
B. Black hat
C. Trojan
D. DDoS
- Which of the following allows a hacker to exploit and compromise a system before the vendor can resolve the issue?
A. Zero-day
B. Day one attack
C. Exploit
D. Ransomware
- Which of the following malware does not have a signature and runs in memory?
A. Rootkit
B. Fileless virus
C. Boot sector virus
D. Polymorphic virus
- Which of the following best describes an employee who uses hacking skills to cause damage to the organization’s systems?