POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

7th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

S3 Computing Security Quiz

S3 Computing Security Quiz

KG - University

10 Qs

Pemrograman Berorientasi Objek

Pemrograman Berorientasi Objek

11th Grade

14 Qs

CyperSecurity

CyperSecurity

10th Grade

10 Qs

Workshop - Introduce Of a Wireshark

Workshop - Introduce Of a Wireshark

1st Grade - University

12 Qs

UH RDBMS

UH RDBMS

12th Grade

10 Qs

6to Informática  Imple Mant Apli Sist Inf

6to Informática Imple Mant Apli Sist Inf

12th Grade

14 Qs

Database Security Quiz

Database Security Quiz

11th Grade

15 Qs

Linux-2 Quiz 2 -- LAMP

Linux-2 Quiz 2 -- LAMP

1st - 12th Grade

15 Qs

POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

Assessment

Quiz

Computers

7th - 12th Grade

Medium

Created by

Renee Bajor

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having multiple levels of protection.

remote access Trojan (RAT)

defense in depth

threat

CIA triad

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The condition of being private or secret.

confidentiality

firmware

logic bomb

backdoor

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All points or areas in a system that could be used or compromised to allow hackers entry into the system.

rootkit

dumpster diving

cryptomalware

attack surface

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The three underlying principles of data protection: confidentiality, integrity, and availability.

rootkit

CIA Triad

pretexting

dumpster diving

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Help break down the aspects of a business and security domains into manageable task areas and tasks to organize protection against cybersecurity threats.

confidentiality

attack surface

integrity

frameworks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The state of data being complete or uncorrupted; also the honesty of a person's actions.

nonrepudiation process

integrity

Internet of Things (IoT)

defense in depth

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computing technology incorporated into nontypical devices to allow communication with other devices and the internet.

CIA Triad

frameworks

Internet of Things (IoT)

attack surface

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?