Cybersecurity Module 2

Cybersecurity Module 2

12th Grade

24 Qs

quiz-placeholder

Similar activities

Cisco Level 3 Modules 1 - 3

Cisco Level 3 Modules 1 - 3

12th Grade

20 Qs

Cybersecurity

Cybersecurity

12th Grade

24 Qs

CIA Triad Quiz Part A

CIA Triad Quiz Part A

12th Grade

20 Qs

Round 1: Hack The Quest

Round 1: Hack The Quest

8th Grade - University

22 Qs

PLTW Cybersecurity

PLTW Cybersecurity

11th - 12th Grade

20 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

11th - 12th Grade

20 Qs

Network Security

Network Security

12th Grade

21 Qs

Information Security Quiz 2

Information Security Quiz 2

12th Grade

20 Qs

Cybersecurity Module 2

Cybersecurity Module 2

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Carol Deuling-Ravell

Used 1+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes why information assets must be identified for cybersecurity purposes?

Because you cannot protect what you have not identified.

Because you should only protect what you have identified.

Because you can only identify some information assets.

Because you should only identify those information assets that are the most important.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

User error resulting in the access to, modification of, and disclosure of confidential information assets represents a loss of:

confidentiality

confidentiality and integrity

availability and integrity

availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Inappropriate file access to, or disclosure of, protectively marked information, whether by an adversary or accidentally, is a loss of:

availability

confidentiality

integrity

availability and confidentiality

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the purpose of a data classification system for cybersecurity?

to ensure filenames are compliant with the naming policy rules

to identify information assets and protect them from a loss of confidentiality, integrity and availability

to describe all possible vulnerabilities in the system

to initiate a threat assessment protocol

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe ensuring that authorized parties are able to access the information when it is needed?

confidentiality

integrity

availability

asset identification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a circumstance or event with the potential to have an adverse effect on organizational operations?

threat

vulnerability

attack

exploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?

threat

vulnerability

attack

exploit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?