0% found this document useful (0 votes)
49 views3 pages

Quiz_ Introduction to Cybersecurity_ Attempt Review _ Training Institute

Uploaded by

Carlos Accetto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views3 pages

Quiz_ Introduction to Cybersecurity_ Attempt Review _ Training Institute

Uploaded by

Carlos Accetto
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

31/8/25, 9:04 Quiz: Introduction to Cybersecurity: Attempt review | Training Institute

 FCF - Introduction to the Threat Landscape 3.0 - ENGLISH


Status Finished
Started Sunday, August 31, 2025, 9:02 AM
Completed Sunday, August 31, 2025, 9:04 AM
Duration 2 mins 17 secs
Points 6/8
Grade 75 out of 100
Feedback I'm sorry, you did not passed.

Question 1

Incorrect

0 points out of 1

Which definition accurately describes cybersecurity?

Select one:

The practice of protecting computer networks, devices, and digital information


The management of critical infrastructure, such as pipelines and electrical power grids
The protection of all information that has been deemed sensitive
The protection of information systems against unauthorized access, modification, and so on 

Question 2

Correct

1 points out of 1

Which cybersecurity term does one of the letters in AAA stand for?

Select one:

Alerts
Acceptability
Anonymity
Accounting 

Question 3
Correct

1 points out of 1

Which definition accurately describes information security (InfoSec)?

Select one:

The processes for preventing, detecting, and remediating attacks on sensitive information, both digital and physical. 
The management of critical infrastructure, such as pipelines, electrical power grids, and data centers in the cloud.
The control of physical access to a building or room where sensitive data is stored, either digitally or physically.
The practice of protecting computer networks, devices, and digital information, whether on-premises or in the cloud.

https://training.fortinet.com/mod/quiz/review.php?attempt=22656504&cmid=795162 1/3
31/8/25, 9:04 Quiz: Introduction to Cybersecurity: Attempt review | Training Institute

Question 4
Correct

1 points out of 1

Which two elements of cybersecurity must be addressed when defending computer networks? (Choose two.)

Select one or more:

Information left on desks or in public places


Human behavior 
Computer technology vulnerabilities 
Physical access points

Question 5

Incorrect

0 points out of 1

Which definition accurately describes information systems security?

Select one:

The control of physical access to a building or room where sensitive data is stored
The protection of information systems against unauthorized access, modification, and so on
The management of information systems, including disaster recovery (DR) and high availability (HA)
The practice of protecting computer networks, devices, and digital information 

Question 6
Correct

1 points out of 1

Which three principles make up the DAD triad? (Choose three.)

Select one or more:

Anonymized data

Alteration 

Denial 

Domain spoofing

Disclosure 

Question 7

Correct

1 points out of 1

Which is the most accurate definition of authorization in cybersecurity?

Select one:

The process of controlling access to resources 


The act of identifying and verifying a person or thing
The practice of verifying activities on computer devices
The act of certifying that someone can perform an action

https://training.fortinet.com/mod/quiz/review.php?attempt=22656504&cmid=795162 2/3
31/8/25, 9:04 Quiz: Introduction to Cybersecurity: Attempt review | Training Institute

Question 8
Correct

1 points out of 1

What are two categories of cybersecurity? (Choose two.)

Select one or more:

Network security 
Building access security
Security accreditation for employees
Critical infrastructure 

https://training.fortinet.com/mod/quiz/review.php?attempt=22656504&cmid=795162 3/3

You might also like