Knowledge check

Completed 200 XP
1.

What are the three most crucial components of cybersecurity known as the CIA Triad?

2.

What three principles of Zero Trust provide layers of defense?

3.

What are people who perform cyberattacks often called?

4.

What strategy is defined as the set of steps an organization takes to prevent a cyberattack?

5.

What type of defense against cyberattacks uses code to convert data into a “hidden language”?


Next unit: Summary

Previous Next