Search Header Logo
WHAT IS CYBERSECURITY PRETEST

WHAT IS CYBERSECURITY PRETEST

Assessment

Flashcard

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

Student preview

quiz-placeholder

25 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which part of the CIA triad was broken when Cynthia modified the lunch menu to say “Green Eggs and Ham”?

Back

Integrity

2.

FLASHCARD QUESTION

Front

Which of the following statements are true? A. There has been a decrease in the number of cyber attacks in the past decade. B. Cybersecurity is the protection of computer systems, networks, and data from digital attacks. C. Cyber attacks in the past few years have impacted individuals, governments, and organizations.

Back

B and C

3.

FLASHCARD QUESTION

Front

Which of the following most accurately describes the Internet of Things?
Options:
Malicious hackers intent on stealing confidential information like credit card numbers or email addresses
,
All of the websites that a person can currently access online
,
Internet service providers who make it possible to go online
,
The network of devices with the ability to connect and exchange data

Back

The network of devices with the ability to connect and exchange data

4.

FLASHCARD QUESTION

Front

Which part of the CIA triad was broken when Robert lost the auction due to the site crashing?

Back

Availability

5.

FLASHCARD QUESTION

Front

Which of the following devices is not a part of the Internet of Things? A watch that allows you to measure and track your activity through a mobile app, A security system that lets you remotely monitor your home, A physical combination padlock for your gym locker, A car with a built-in navigation system

Back

A physical combination padlock for your gym locker

6.

FLASHCARD QUESTION

Front

Which part of the CIA triad was broken when Sarah's little brother broke the lock and read her diary?

Back

Confidentiality

7.

FLASHCARD QUESTION

Front

What does a ransomware hacker do when they gain access to a user’s system?

Back

Encrypt important files

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?