Security Fundamentals Review 1

Security Fundamentals Review 1

11th Grade

10 Qs

quiz-placeholder

Similar activities

Quiz Pengetahuan 2

Quiz Pengetahuan 2

11th Grade

15 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Welcome to Cyber Security

Welcome to Cyber Security

7th - 12th Grade

10 Qs

Understanding Cybersecurity Fundamentals

Understanding Cybersecurity Fundamentals

11th Grade

6 Qs

As/A Level  CS 9Chpt_6: Security, Privacy, and Integrity of Data

As/A Level CS 9Chpt_6: Security, Privacy, and Integrity of Data

11th Grade

15 Qs

Computer Security

Computer Security

11th Grade

10 Qs

POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

7th - 12th Grade

10 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Security Fundamentals Review 1

Security Fundamentals Review 1

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Yarice Hidalgo

Used 7+ times

FREE Resource

10 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What is Cybersecurity?

Evaluate responses using AI:

OFF

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Mark all the choices that describe Cybersecurity.

Has emerged as one of the most critical areas that businesses and other organizations must address in their day-to-day operations.

Is one of the best paid careers in today's market.

Is the Fastest Growing Tech Sector Worldwide . 

All of the Above

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The ________ is a paradigm for guiding information security policy inside an organization.

4.

MATCH QUESTION

1 min • 1 pt

Match the following

safeguards are in place to protect sensitive data from unwanted access.

Integrity

security method in which a system's default configuration is changed to protect it against assaults.

Confidentiality

it refers to the consistency, correctness, and reliability of data throughout its lifespan.

Hardening

refers to the capacity for authorized parties to access information consistently.

Availability

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A__________ occurs when the confidentiality of secret or private information is breached, whether via international or unintentional means.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select the terminology that represent data breach methods.

Snooping

Wiretapping

Social Engineering

Eavesdropping

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE OR FALSE? Integrity is jeopardized anytime someone has access to sensitive material without permission or when it is unintentionally changed in any way.

TRUE

FALSE

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?