Search Header Logo

GenCyber Cybersecurity Concepts

Authored by RPSEC RPSEC

Computers

Professional Development

Used 3+ times

GenCyber Cybersecurity Concepts
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Your home computer is secured by locks on the door, an alarm system, and a firewall.

Confidentiality

Defense In Depth

Keep it Simple

Availability

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

At a hospital, medical information about a patient is protected and only provided to authorized personnel.

Availability

Defense in Depth

Confidentiality

Integrity

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Student grades are accurate and have not been modified by an unauthorized user.

Integrity

Keep it Simple

Think Like an Adversary

Confidentiality

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A banking system is appropriately accessible by both customers and banking employees.

Think Like an Adversary

Integrity

Confidentiality

Availability

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

In order to protect student data, it is useful to think of potential adversaries, such as a student wishing to change their own grades.

Think Like an Adversary

Keep it Simple

Confidentiality

Defense in Depth

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A complex computer system has many points of access and may be difficult to secure.

Think Like an Adversary

Availability

Keep it Simple

Integrity

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?