Security Fundamentals Review 1

Security Fundamentals Review 1

11th Grade

10 Qs

quiz-placeholder

Similar activities

GenCyber Cybersecurity Concept Examples

GenCyber Cybersecurity Concept Examples

9th - 12th Grade

12 Qs

Communication technologies - key terms

Communication technologies - key terms

9th - 11th Grade

10 Qs

The Normalisation Process

The Normalisation Process

9th - 12th Grade

8 Qs

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

10th Grade - University

11 Qs

CIA Triad & Digital Security

CIA Triad & Digital Security

11th Grade

13 Qs

Information Security

Information Security

9th - 12th Grade

8 Qs

Ulangan Harian-1 TLJ Kelas 12

Ulangan Harian-1 TLJ Kelas 12

11th Grade

11 Qs

ITF Cert Review

ITF Cert Review

9th - 12th Grade

15 Qs

Security Fundamentals Review 1

Security Fundamentals Review 1

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Yarice Hidalgo

Used 7+ times

FREE Resource

10 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What is Cybersecurity?

Evaluate responses using AI:

OFF

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Mark all the choices that describe Cybersecurity.

Has emerged as one of the most critical areas that businesses and other organizations must address in their day-to-day operations.

Is one of the best paid careers in today's market.

Is the Fastest Growing Tech Sector Worldwide . 

All of the Above

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The ________ is a paradigm for guiding information security policy inside an organization.

4.

MATCH QUESTION

1 min • 1 pt

Match the following

security method in which a system's default configuration is changed to protect it against assaults.

Integrity

refers to the capacity for authorized parties to access information consistently.

Confidentiality

it refers to the consistency, correctness, and reliability of data throughout its lifespan.

Hardening

safeguards are in place to protect sensitive data from unwanted access.

Availability

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A__________ occurs when the confidentiality of secret or private information is breached, whether via international or unintentional means.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select the terminology that represent data breach methods.

Snooping

Wiretapping

Social Engineering

Eavesdropping

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE OR FALSE? Integrity is jeopardized anytime someone has access to sensitive material without permission or when it is unintentionally changed in any way.

TRUE

FALSE

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?