Creating a Secure System (5.1 - 5.3)

Creating a Secure System (5.1 - 5.3)

9th - 12th Grade

30 Qs

quiz-placeholder

Similar activities

APCSP Cyber

APCSP Cyber

9th - 12th Grade

33 Qs

CIA Triad

CIA Triad

9th - 12th Grade

31 Qs

Module 10 Post - Assessment

Module 10 Post - Assessment

11th Grade

25 Qs

Cyber Security Quiz

Cyber Security Quiz

1st - 10th Grade

25 Qs

CSEC IT - 11 Security Mechanisms

CSEC IT - 11 Security Mechanisms

10th - 12th Grade

31 Qs

Ch. 3 Review

Ch. 3 Review

11th Grade

32 Qs

AP Computer Science Principles Cybersecurity

AP Computer Science Principles Cybersecurity

9th - 12th Grade

33 Qs

AP CSP Cyber Security

AP CSP Cyber Security

9th - 12th Grade

33 Qs

Creating a Secure System (5.1 - 5.3)

Creating a Secure System (5.1 - 5.3)

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Teagan Graves

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What is the primary goal of information security?

Confidentiality

 Availability

Integrity

All of the above

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a strong password?

"password123"

 "123456"

"letmein"

 "P@BwOrd1"

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What does the acronym "VPN" stand for in the context of computer security?

Virtual Personal Network

Very Private Network

Virtual Private Network

Validated Personal Network

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which type of malware is designed to self-replicate and spread across networks?

Trojan Horse

Spyware

Worm

Ransomware

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What is the process of converting data into a secret code to prevent unauthorized access called?

Decryption

Encryption

 Authentication

Firewall

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which security principle involves limiting access to only those who need it to perform their job functions?

Least Privilege

Defense in Depth

Social Engineering

Phishing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

What type of attack involves an attacker intercepting and altering communication between two parties without their knowledge?

Phishing

Man-in-the-Middle (MitM)

DDoS

SQL Injection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?