RING UNIT 4 - DATA SECURITY

RING UNIT 4 - DATA SECURITY

12th Grade

24 Qs

quiz-placeholder

Similar activities

POWERPOINT QUIZZ

POWERPOINT QUIZZ

10th - 12th Grade

20 Qs

Skill Competition Quiz 2024

Skill Competition Quiz 2024

10th Grade - University

20 Qs

Evaluación 2° Tecnología

Evaluación 2° Tecnología

9th - 12th Grade

20 Qs

Topic 4.1 Introduction to Java

Topic 4.1 Introduction to Java

12th Grade

20 Qs

SOFTWARE 7I

SOFTWARE 7I

7th Grade - University

20 Qs

Animated Canvas

Animated Canvas

9th - 12th Grade

19 Qs

N+ Chapter 5

N+ Chapter 5

12th Grade

20 Qs

Coding Karel 2

Coding Karel 2

KG - University

20 Qs

RING UNIT 4 - DATA SECURITY

RING UNIT 4 - DATA SECURITY

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

F.C.SF.t10, 4.2.1a, 4.2.2 LO

+5

Standards-aligned

Created by

Andrew Griffin

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A student is completing a college application for the next school year. While going to the next page in the application, the website becomes unresponsive and appears to crash. She attempts to reload the admissions page, but she is unable to access the application.

What part of the CIA triad has been compromised?

Confidentiality

Integrity

Availability

Tags

F.C.SF.t10

2.

MATCH QUESTION

1 min • 1 pt

Select the act or policy that matches the provided description.

General Data Protection Regulation(GDPR)

United States Legislation that provides data privacy and security provisions for safeguarding medical information.

HIPAA

Guidelines that restrict and define how a computer, network, website, or service should be responsibly used.

Acceptable Use Policy

Gives customers in California more control over their personal information

California Consumer Privacy Act (CCPA)

Prohibits accessing a computer or device without authorization, or in excess of authorizations (continued access after authorization has expired)

Computer Fraud and Abuse Act (CFAA)

A set of regulations designed to give European citizens more control over their personal data.

Tags

4.2.1a

4.2.1c

4.2.1d EK

4.2.1e EK

4.2.1f EK

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following physical security controls would prevent an intruder from accessing a secure facility?

Door Locks

Security Cameras

Secure Shredding

Two-factor authentication

Tags

4.2.2 LO

4.2.2a EK

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following physical security controls would detect someone stealing personal information?

Door Locks

Security Cameras

Secure Shredding

Two-factor authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process by which you verify someone is who they say they are?

Authentication

Authorization

Accounting

Auditing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What process determines which resources a user may access after logging on?

Auditing

Authentication

Authorization

Accounting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technical controls would you implement for identity management before provisioning a new company-issued account for an individual?

Matching the individuals photo to a government-issued ID card

Vulnerability scan on the individual's personal computer

Encrypt the personal information of the individual

Set up a personal firewall on the individual's personal computer

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?