
Cybersecurity Module 2

Quiz
•
Computers
•
12th Grade
•
Medium
Carol Deuling-Ravell
Used 1+ times
FREE Resource
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement describes why information assets must be identified for cybersecurity purposes?
Because you cannot protect what you have not identified.
Because you should only protect what you have identified.
Because you can only identify some information assets.
Because you should only identify those information assets that are the most important.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
User error resulting in the access to, modification of, and disclosure of confidential information assets represents a loss of:
confidentiality
confidentiality and integrity
availability and integrity
availability
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Inappropriate file access to, or disclosure of, protectively marked information, whether by an adversary or accidentally, is a loss of:
availability
confidentiality
integrity
availability and confidentiality
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement describes the purpose of a data classification system for cybersecurity?
to ensure filenames are compliant with the naming policy rules
to identify information assets and protect them from a loss of confidentiality, integrity and availability
to describe all possible vulnerabilities in the system
to initiate a threat assessment protocol
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used to describe ensuring that authorized parties are able to access the information when it is needed?
confidentiality
integrity
availability
asset identification
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term refers to a circumstance or event with the potential to have an adverse effect on organizational operations?
threat
vulnerability
attack
exploit
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?
threat
vulnerability
attack
exploit
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
ASPEL LEGAL TIK

Quiz
•
12th Grade
24 questions
Chapter 11: Security and Privacy

Quiz
•
10th Grade - University
21 questions
Cybersecurity Chapter 2 Quiz

Quiz
•
12th Grade
25 questions
ULANGAN HARIAN INFORMATIKA KELAS XI SEMESTER 2

Quiz
•
12th Grade
25 questions
EOS WHAT IS CYBERSECURITY TEST

Quiz
•
9th - 12th Grade
25 questions
T-Level DBS RCE 10 - Revision Quiz No 1

Quiz
•
12th Grade
20 questions
XII SMK BAB 1 FIREWALL

Quiz
•
12th Grade
20 questions
keamanan jaringan & firewall

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade