information security

information security

7th Grade

14 Qs

quiz-placeholder

Similar activities

Lesson 1 Python I Review

Lesson 1 Python I Review

6th - 8th Grade

10 Qs

ICT Quizz

ICT Quizz

7th Grade

12 Qs

Year 8 EOY FUNCTIONS

Year 8 EOY FUNCTIONS

7th Grade

10 Qs

Social Media and Reality

Social Media and Reality

7th Grade

14 Qs

Exam

Exam

6th - 8th Grade

10 Qs

Lazarbeam

Lazarbeam

KG - Professional Development

11 Qs

Acceptable Use Policy (Quiz)

Acceptable Use Policy (Quiz)

6th - 8th Grade

15 Qs

ICT project

ICT project

7th Grade

15 Qs

information security

information security

Assessment

Quiz

Computers

7th Grade

Medium

Created by

Selina Fan

Used 40+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three traids of cybersecurity?

Confidentially, Integrity, Availability

Confidentially, Intellectual, Availability

Combining, Intellectual, Accessibility

Combining, Integrity, Accessibility

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice told her friend about her password of wechat. What traid does she violate?

Confidentially

Integrity

Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice told her friend Bob about her email password. And then she found Bob used her email sent emails to others. Who is responsible for this case?

Alice

Bob

Alice and Bob

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice told her friend Bob about her email password. And then she found Bob changed some her emails and sent emails to others. What traids are involved into this case?

Confidentially and Integrity

Integrity and Availability

Confidentally and Availability

Confidentally, Integrity and Availability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice has a company which is not well-run comparing with Bob's. So she decided sent some malware to servers of Bob's company. What traid she violated?

Confidentally

Integrity

Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If Alice sent some malware to Bob company's servers, who is responsible to this case?

Alice

Bob

Alice and Bob

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice inserts a trojan program into Bob's laptop, and she found out Bob's password of his bank accounts. She did not take any money, so does she violate any laws?

Yes, she violated laws of Trade Secret, Business Secret

Yes, she violated laws of cybersecurity

No she did not

Yes, she violate the polity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?