Definition of Threat in Information Security


Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

A _____ is anything that can negatively alter, disrupt, hide, or erase an object or objects of interest.

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. Information security threats can be _____.

2. Fire is an example of a _____ information security threat.

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

This quiz and worksheet provide an assessment and review of your understanding of information security threats. You'll review the types of threats, where they come from and how security works.

Quiz & Worksheet Goals

This quiz and worksheet were designed to help you review:

  • Where threats come from
  • Examples of different types of threats
  • What affects information negatively
  • How information security works

Skills Practiced

  • Information recall - see if you can remember the types of threats and examples
  • Interpreting information - review what you learned about how information security works and were able to interpret it correctly
  • Knowledge application - revisit your understanding of what an information security threat is and answer questions about what it does

Additional Learning

Brush up your knowledge of this topic with the lesson Definition of Threat in Information Security. This lesson offers more detail about:

  • How information security works
  • Defining a threat
  • What a threat does to information security
  • The source of a threat