Day 3 Quizz

Day 3 Quizz

8th Grade

7 Qs

quiz-placeholder

Similar activities

Cybersecurity, Victor Magnusson

Cybersecurity, Victor Magnusson

1st Grade - Professional Development

10 Qs

Sangfor VDI partner training - B

Sangfor VDI partner training - B

1st - 10th Grade

10 Qs

Cybersecurity Part 1

Cybersecurity Part 1

8th Grade

7 Qs

Being Aware of What You Share (8th)

Being Aware of What You Share (8th)

8th Grade

6 Qs

Design thinking

Design thinking

6th - 8th Grade

11 Qs

Informática 2E

Informática 2E

8th Grade

10 Qs

Don`t Feed the Phish

Don`t Feed the Phish

6th - 8th Grade

10 Qs

Windows 2019

Windows 2019

8th Grade - University

10 Qs

Day 3 Quizz

Day 3 Quizz

Assessment

Quiz

Instructional Technology

8th Grade

Medium

Created by

Tyler Derickson

Used 1+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three terms that make up the cybersecurity cube?

Security Principles

Data States

Prioritize Actions

Safeguards

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the terms of the CIA triad?

Confidentiality

Centralize

Integrity

Availability

Authentication

3.

DRAG AND DROP QUESTION

1 min • 1 pt

The cybersecurity ​ (a)   should practice response protocols, test ​ (b)   systems, and be familiar with ​ (c)   for restoring ​ (d)   systems.

team
backup
procedures
critical

4.

MATCH QUESTION

1 min • 1 pt

Match the following passwords to their corresponding strength rating.

"Panda2"

Better

"secret"

Weak

"Panda$AreGr3at!"

Best

5.

MATCH QUESTION

1 min • 1 pt

Match the following terms and definitions.

the verification of the identity of each user, to prevent unauthorized access

Authentication

keeps track of what users do, what they access, and how long they do it

Accounting

determine which resources users can access, along with the operations that users can perform

Authorization

6.

DRAG AND DROP QUESTION

1 min • 1 pt

Multi-Factor ​ (a)   uses at least ​ (b)   methods of ​ (c)   . It can help ​ (d)   user's accounts from unauthorized ​ (e)   .

authentication
two
verification
protect
access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Identification?

enforces the rules established by an authorization policy

allows tech admins to track users

gives users a laptop assigned to them

uses two factors to allow access to an account