cyber-security

cyber-security

11th Grade

6 Qs

quiz-placeholder

Similar activities

Unit 2 LO6 Lesson 2 Risks

Unit 2 LO6 Lesson 2 Risks

11th Grade

6 Qs

Cyber crime quiz

Cyber crime quiz

11th Grade

11 Qs

bab 6 modul etika profesi teknik informatika

bab 6 modul etika profesi teknik informatika

1st - 12th Grade

10 Qs

Cybersecurity

Cybersecurity

7th - 12th Grade

10 Qs

Session 1

Session 1

9th - 12th Grade

10 Qs

Cars 2.0

Cars 2.0

1st Grade - Professional Development

10 Qs

AI Bias member pres quiz

AI Bias member pres quiz

9th - 12th Grade

5 Qs

Cybersecurity Fundamentals Week 1 Quiz

Cybersecurity Fundamentals Week 1 Quiz

KG - University

10 Qs

cyber-security

cyber-security

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Robin Opondo

Used 61+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In cyber-security, CIA triad is a common pillar. What is C in the CIA triad?

Computer

Confidentiality

Control

Content

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A student accidentally accessed a file they are not authorised to access. Which of the following components of CIA triad did they breach?

Confidentiality

Integrity

Accessibility

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mr. Ali accidentally gained access to the financial account computer system of his organisation and changed his pay / salary. Which CIA principle did he compromise?

Confidentiality

Integrity

Availability

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Denial of Service attack (DOS) affects one of the CIA pillars. which pillar does it affect?

Confidentiality

Integrity

Availability

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

………………………………………. is a cyber-attack intended to redirect a website's traffic to another, fake site.

Virus

Spyware

Phishing

Pharming

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a security measure of cyber-security.

downloading attachment from untrustworthy sources

Using an up-to-date antivirus program

Updating your computer software frequently

Installing a firewall to in organisation network