Search Header Logo

Model of Computer Security and Network Security Goals

Authored by Alex Brenon-Hodas

Computers

11th Grade

Used 1+ times

Model of Computer Security and Network Security Goals
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the Model of Computer Security, what does 'Protection' stand for?

The actions taken after a security breach

The goal of computer security

The process of keeping data intact and unmodified

The actions taken to prevent a security issue before it happens

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'CIA' stand for in the context of Network Security goals?

Calculation, Integration, Authentication

Confidentiality, Integrity, Availability

Control, Inspection, Authorization

Connection, Identification, Authorization

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of maintaining 'Confidentiality' in Network Security?

Ensuring data is not revealed to unauthorized entities

Making sure data is accessible to allowed users

Keeping data intact and not modified or corrupted

Protecting systems from cyber attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does integrity in cybersecurity refer to?

Protection against unauthorized access

Protection against data loss

Protection against unauthorized modification

Protection against software piracy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "Availability" in cybersecurity refer to?

Ensuring that data is not changed by unauthorized individuals

Ensuring that data is kept secret and private

Protection against denial of service

Ensuring that data is accessible to authorized users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a breach of confidentiality?

A DDoS attack that takes down a website

A virus that corrupts data on a computer

NSA leaks of government data by Edward Snowden

A firewall that fails to filter out malicious traffic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common reason for a loss of availability in data?

A Distributed Denial of Service (DDoS) attack.

A virus infection.

Physical damage to storage devices.

Unauthorized data encryption.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?