POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

7th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

9th - 12th Grade

15 Qs

Cybersecurity Fundamentals Week 2 Quiz

Cybersecurity Fundamentals Week 2 Quiz

KG - University

10 Qs

Cisco CCST Objective 1

Cisco CCST Objective 1

12th Grade

10 Qs

2425 Workplace and Emerging Tech

2425 Workplace and Emerging Tech

9th Grade

13 Qs

POST TEST JKI

POST TEST JKI

10th Grade

10 Qs

Computer Knowledge Challenge

Computer Knowledge Challenge

11th Grade

15 Qs

computer security

computer security

KG - 12th Grade

12 Qs

Cybersecurity Concepts and Definitions

Cybersecurity Concepts and Definitions

7th Grade

10 Qs

POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

Assessment

Quiz

Computers

7th - 12th Grade

Medium

Created by

Renee Bajor

Used 12+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having multiple levels of protection.

remote access Trojan (RAT)

defense in depth

threat

CIA triad

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The condition of being private or secret.

confidentiality

firmware

logic bomb

backdoor

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All points or areas in a system that could be used or compromised to allow hackers entry into the system.

rootkit

dumpster diving

cryptomalware

attack surface

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The three underlying principles of data protection: confidentiality, integrity, and availability.

rootkit

CIA Triad

pretexting

dumpster diving

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Help break down the aspects of a business and security domains into manageable task areas and tasks to organize protection against cybersecurity threats.

confidentiality

attack surface

integrity

frameworks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The state of data being complete or uncorrupted; also the honesty of a person's actions.

nonrepudiation process

integrity

Internet of Things (IoT)

defense in depth

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computing technology incorporated into nontypical devices to allow communication with other devices and the internet.

CIA Triad

frameworks

Internet of Things (IoT)

attack surface

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?