Intro to Cybersecurity

Quiz
•
Other
•
University
•
Medium
Stephanie Allen
Used 15+ times
FREE Resource
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Aarav is working on a project to secure his company's information system. He needs to ensure the CIA triad principles are followed. What does the C in CIA stand for?
Consistency
Confidentiality
Content
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a cybersecurity class, Freya learns about the CIA triad. What does the I in CIA stand for?
Integrity
Intuition
Instance
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Arthur is working on a project to improve the security of his company's information system. He is focusing on the CIA triad. What does the A in CIA stand for?
Accessibility
Availability
Authorization
Authentication
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James, Florence, and Poppy are working on a cybersecurity project. They are discussing which state of data is the easiest to protect. Can you help them?
Data at rest, like the files stored on their computers
Data in transit, like emails they are sending to each other
Data in process, like the data being used by their software
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Amelia, Henry, and Max are working on a cybersecurity project. They are discussing which state of data is the hardest to protect. Amelia thinks it's data at rest, Henry believes it's data in transit, but Max argues that it's data in process. According to Max, which state of data is the hardest to protect?
Data at rest
Data in transit
Data in process
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ava is sending a confidential document to James over the internet. Which technology should she use to ensure the document's confidentiality?
Encryption
Hashing
Access Control
Authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Isabelle, Rosie, and Noah are working on a project to secure their school's computer network. They decide to use the McCumber Cube model. What are the cybersecurity countermeasures in the McCumber Cube that they should consider?
People, processes and technologies
Authentication, authorization and accounting
Confidentiality, integrity and availability
Functionality, usability and security
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Info Security

Quiz
•
University - Professi...
15 questions
Cybersecurity Basics Quiz

Quiz
•
6th Grade - University
10 questions
Careers in the Global Age

Quiz
•
University
14 questions
Global Governance Quiz

Quiz
•
University
10 questions
Data Warehousing

Quiz
•
University
10 questions
RnC Global Townhall

Quiz
•
University
10 questions
Week 7 - Weekly Participation Activity

Quiz
•
University
10 questions
Daily Quiz (24.12.20)

Quiz
•
7th Grade - Professio...
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Other
10 questions
Would you rather...

Quiz
•
KG - University
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
10 questions
The Constitution, the Articles, and Federalism Crash Course US History

Interactive video
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
16 questions
Water Modeling Activity

Lesson
•
11th Grade - University
10 questions
ACT English prep

Quiz
•
9th Grade - University