RING UNIT 4 - DATA SECURITY

RING UNIT 4 - DATA SECURITY

12th Grade

24 Qs

quiz-placeholder

Similar activities

REDES I-medios no guiados

REDES I-medios no guiados

1st - 12th Grade

20 Qs

Quiz sobre Administración

Quiz sobre Administración

12th Grade - University

20 Qs

JAVA method

JAVA method

12th Grade

21 Qs

PPG 25 Feb 2022

PPG 25 Feb 2022

12th Grade

19 Qs

Computación 1ro y 2do básico

Computación 1ro y 2do básico

1st Grade - University

20 Qs

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

Tin 12 hk1 p2

Tin 12 hk1 p2

12th Grade

20 Qs

ICT WEBINAR QUIZ

ICT WEBINAR QUIZ

KG - Professional Development

20 Qs

RING UNIT 4 - DATA SECURITY

RING UNIT 4 - DATA SECURITY

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

F.C.SF.t10, 4.2.1a, 4.2.2 LO

+5

Standards-aligned

Created by

Andrew Griffin

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A student is completing a college application for the next school year. While going to the next page in the application, the website becomes unresponsive and appears to crash. She attempts to reload the admissions page, but she is unable to access the application.

What part of the CIA triad has been compromised?

Confidentiality

Integrity

Availability

Tags

F.C.SF.t10

2.

MATCH QUESTION

1 min • 1 pt

Select the act or policy that matches the provided description.

Acceptable Use Policy

Gives customers in California more control over their personal information

HIPAA

A set of regulations designed to give European citizens more control over their personal data.

Computer Fraud and Abuse Act (CFAA)

Guidelines that restrict and define how a computer, network, website, or service should be responsibly used.

California Consumer Privacy Act (CCPA)

United States Legislation that provides data privacy and security provisions for safeguarding medical information.

General Data Protection Regulation(GDPR)

Prohibits accessing a computer or device without authorization, or in excess of authorizations (continued access after authorization has expired)

Tags

4.2.1a

4.2.1c

4.2.1d EK

4.2.1e EK

4.2.1f EK

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following physical security controls would prevent an intruder from accessing a secure facility?

Door Locks

Security Cameras

Secure Shredding

Two-factor authentication

Tags

4.2.2 LO

4.2.2a EK

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following physical security controls would detect someone stealing personal information?

Door Locks

Security Cameras

Secure Shredding

Two-factor authentication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process by which you verify someone is who they say they are?

Authentication

Authorization

Accounting

Auditing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What process determines which resources a user may access after logging on?

Auditing

Authentication

Authorization

Accounting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following technical controls would you implement for identity management before provisioning a new company-issued account for an individual?

Matching the individuals photo to a government-issued ID card

Vulnerability scan on the individual's personal computer

Encrypt the personal information of the individual

Set up a personal firewall on the individual's personal computer

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?