
Model of Computer Security and Network Security Goals
Authored by Alex Brenon-Hodas
Computers
11th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
39 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the Model of Computer Security, what does 'Protection' stand for?
The actions taken after a security breach
The goal of computer security
The process of keeping data intact and unmodified
The actions taken to prevent a security issue before it happens
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does 'CIA' stand for in the context of Network Security goals?
Calculation, Integration, Authentication
Confidentiality, Integrity, Availability
Control, Inspection, Authorization
Connection, Identification, Authorization
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the goal of maintaining 'Confidentiality' in Network Security?
Ensuring data is not revealed to unauthorized entities
Making sure data is accessible to allowed users
Keeping data intact and not modified or corrupted
Protecting systems from cyber attacks
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does integrity in cybersecurity refer to?
Protection against unauthorized access
Protection against data loss
Protection against unauthorized modification
Protection against software piracy
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does "Availability" in cybersecurity refer to?
Ensuring that data is not changed by unauthorized individuals
Ensuring that data is kept secret and private
Protection against denial of service
Ensuring that data is accessible to authorized users
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a breach of confidentiality?
A DDoS attack that takes down a website
A virus that corrupts data on a computer
NSA leaks of government data by Edward Snowden
A firewall that fails to filter out malicious traffic
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common reason for a loss of availability in data?
A Distributed Denial of Service (DDoS) attack.
A virus infection.
Physical damage to storage devices.
Unauthorized data encryption.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?