Intro to Cybersecurity

Intro to Cybersecurity

University

13 Qs

quiz-placeholder

Similar activities

Bank Lending Fun Quiz 2 - FinTech

Bank Lending Fun Quiz 2 - FinTech

University - Professional Development

9 Qs

AI Terminology Quiz

AI Terminology Quiz

University

11 Qs

BABM3006 Crisis Management and Technology Quiz

BABM3006 Crisis Management and Technology Quiz

University

10 Qs

eForum eGames

eForum eGames

University

15 Qs

TERCER MOMENTO CONTA III PARES

TERCER MOMENTO CONTA III PARES

University

8 Qs

Cybersecurity Quiz - MBSTU Career Club

Cybersecurity Quiz - MBSTU Career Club

University

10 Qs

Zero day

Zero day

12th Grade - Professional Development

10 Qs

Accounting Information System

Accounting Information System

University

10 Qs

Intro to Cybersecurity

Intro to Cybersecurity

Assessment

Quiz

Other

University

Medium

Created by

Stephanie Allen

Used 15+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aarav is working on a project to secure his company's information system. He needs to ensure the CIA triad principles are followed. What does the C in CIA stand for?

Consistency

Confidentiality

Content

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cybersecurity class, Freya learns about the CIA triad. What does the I in CIA stand for?

Integrity

Intuition

Instance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Arthur is working on a project to improve the security of his company's information system. He is focusing on the CIA triad. What does the A in CIA stand for?

Accessibility

Availability

Authorization

Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James, Florence, and Poppy are working on a cybersecurity project. They are discussing which state of data is the easiest to protect. Can you help them?

Data at rest, like the files stored on their computers

Data in transit, like emails they are sending to each other

Data in process, like the data being used by their software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Amelia, Henry, and Max are working on a cybersecurity project. They are discussing which state of data is the hardest to protect. Amelia thinks it's data at rest, Henry believes it's data in transit, but Max argues that it's data in process. According to Max, which state of data is the hardest to protect?

Data at rest

Data in transit

Data in process

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ava is sending a confidential document to James over the internet. Which technology should she use to ensure the document's confidentiality?

Encryption

Hashing

Access Control

Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Isabelle, Rosie, and Noah are working on a project to secure their school's computer network. They decide to use the McCumber Cube model. What are the cybersecurity countermeasures in the McCumber Cube that they should consider?

People, processes and technologies

Authentication, authorization and accounting

Confidentiality, integrity and availability

Functionality, usability and security

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?