31/8/25, 9:04 Quiz: Introduction to Cybersecurity: Attempt review | Training Institute
FCF - Introduction to the Threat Landscape 3.0 - ENGLISH
Status Finished
Started Sunday, August 31, 2025, 9:02 AM
Completed Sunday, August 31, 2025, 9:04 AM
Duration 2 mins 17 secs
Points 6/8
Grade 75 out of 100
Feedback I'm sorry, you did not passed.
Question 1
Incorrect
0 points out of 1
Which definition accurately describes cybersecurity?
Select one:
The practice of protecting computer networks, devices, and digital information
The management of critical infrastructure, such as pipelines and electrical power grids
The protection of all information that has been deemed sensitive
The protection of information systems against unauthorized access, modification, and so on
Question 2
Correct
1 points out of 1
Which cybersecurity term does one of the letters in AAA stand for?
Select one:
Alerts
Acceptability
Anonymity
Accounting
Question 3
Correct
1 points out of 1
Which definition accurately describes information security (InfoSec)?
Select one:
The processes for preventing, detecting, and remediating attacks on sensitive information, both digital and physical.
The management of critical infrastructure, such as pipelines, electrical power grids, and data centers in the cloud.
The control of physical access to a building or room where sensitive data is stored, either digitally or physically.
The practice of protecting computer networks, devices, and digital information, whether on-premises or in the cloud.
https://training.fortinet.com/mod/quiz/review.php?attempt=22656504&cmid=795162 1/3
31/8/25, 9:04 Quiz: Introduction to Cybersecurity: Attempt review | Training Institute
Question 4
Correct
1 points out of 1
Which two elements of cybersecurity must be addressed when defending computer networks? (Choose two.)
Select one or more:
Information left on desks or in public places
Human behavior
Computer technology vulnerabilities
Physical access points
Question 5
Incorrect
0 points out of 1
Which definition accurately describes information systems security?
Select one:
The control of physical access to a building or room where sensitive data is stored
The protection of information systems against unauthorized access, modification, and so on
The management of information systems, including disaster recovery (DR) and high availability (HA)
The practice of protecting computer networks, devices, and digital information
Question 6
Correct
1 points out of 1
Which three principles make up the DAD triad? (Choose three.)
Select one or more:
Anonymized data
Alteration
Denial
Domain spoofing
Disclosure
Question 7
Correct
1 points out of 1
Which is the most accurate definition of authorization in cybersecurity?
Select one:
The process of controlling access to resources
The act of identifying and verifying a person or thing
The practice of verifying activities on computer devices
The act of certifying that someone can perform an action
https://training.fortinet.com/mod/quiz/review.php?attempt=22656504&cmid=795162 2/3
31/8/25, 9:04 Quiz: Introduction to Cybersecurity: Attempt review | Training Institute
Question 8
Correct
1 points out of 1
What are two categories of cybersecurity? (Choose two.)
Select one or more:
Network security
Building access security
Security accreditation for employees
Critical infrastructure
https://training.fortinet.com/mod/quiz/review.php?attempt=22656504&cmid=795162 3/3