Day 3 Quizz

Day 3 Quizz

8th Grade

7 Qs

quiz-placeholder

Similar activities

Being Aware of What You Share

Being Aware of What You Share

8th Grade

10 Qs

Lesson 1- Computer File Management

Lesson 1- Computer File Management

7th - 12th Grade

10 Qs

Day A Computers

Day A Computers

6th - 8th Grade

6 Qs

Computer Crime and Security Measures Quiz

Computer Crime and Security Measures Quiz

8th Grade

7 Qs

L2-Being Aware of What You Share

L2-Being Aware of What You Share

8th Grade

5 Qs

HTML Structure and Headings

HTML Structure and Headings

8th Grade

11 Qs

Sangfor IAM partner training - A

Sangfor IAM partner training - A

1st - 10th Grade

10 Qs

Passwords ICT

Passwords ICT

6th - 8th Grade

4 Qs

Day 3 Quizz

Day 3 Quizz

Assessment

Quiz

Instructional Technology

8th Grade

Medium

Created by

Tyler Derickson

Used 1+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three terms that make up the cybersecurity cube?

Security Principles

Data States

Prioritize Actions

Safeguards

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the terms of the CIA triad?

Confidentiality

Centralize

Integrity

Availability

Authentication

3.

DRAG AND DROP QUESTION

1 min • 1 pt

The cybersecurity ​ (a)   should practice response protocols, test ​ (b)   systems, and be familiar with ​ (c)   for restoring ​ (d)   systems.

team
backup
procedures
critical

4.

MATCH QUESTION

1 min • 1 pt

Match the following passwords to their corresponding strength rating.

"Panda$AreGr3at!"

Better

"secret"

Best

"Panda2"

Weak

5.

MATCH QUESTION

1 min • 1 pt

Match the following terms and definitions.

the verification of the identity of each user, to prevent unauthorized access

Authorization

determine which resources users can access, along with the operations that users can perform

Authentication

keeps track of what users do, what they access, and how long they do it

Accounting

6.

DRAG AND DROP QUESTION

1 min • 1 pt

Multi-Factor ​ (a)   uses at least ​ (b)   methods of ​ (c)   . It can help ​ (d)   user's accounts from unauthorized ​ (e)   .

authentication
two
verification
protect
access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Identification?

enforces the rules established by an authorization policy

allows tech admins to track users

gives users a laptop assigned to them

uses two factors to allow access to an account