5. Infrastructure and Security
Cybersecurity — Quiz
Test your understanding of cybersecurity with 5 practice questions.
Practice Questions
Question 1
Which of the following describes the process of converting information or data into a code to prevent unauthorized access?
Question 2
What is the term for a deliberate act that exploits a vulnerability in an information system to cause harm or gain unauthorized access?
Question 3
Which of the following is a security measure that controls incoming and outgoing network traffic based on predetermined security rules?
Question 4
What is the practice of regularly updating software, operating systems, and applications to fix known security flaws?
Question 5
Which of the following best describes 'malware'?
