Model of Computer Security and Network Security Goals

Model of Computer Security and Network Security Goals

11th Grade

39 Qs

quiz-placeholder

Similar activities

Web Development and Internet Security Quiz

Web Development and Internet Security Quiz

11th Grade

35 Qs

Unit 1 Advanced Cybersecurity

Unit 1 Advanced Cybersecurity

11th Grade

35 Qs

Unit 8 Cybersecurity Review

Unit 8 Cybersecurity Review

11th Grade

40 Qs

OCR J277 GCSE Paper 1 Recap

OCR J277 GCSE Paper 1 Recap

9th Grade - University

35 Qs

R050: TA04 Cybersecurity and legislation

R050: TA04 Cybersecurity and legislation

11th Grade

38 Qs

Unit 4 Review

Unit 4 Review

9th - 12th Grade

35 Qs

YEAR 11 DATA PROCESSING SECOND TERM UNIFIED TEST

YEAR 11 DATA PROCESSING SECOND TERM UNIFIED TEST

9th - 12th Grade

40 Qs

AQA Computer Science GCSE - 3.5 Computer networks

AQA Computer Science GCSE - 3.5 Computer networks

10th - 12th Grade

39 Qs

Model of Computer Security and Network Security Goals

Model of Computer Security and Network Security Goals

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Alex Brenon-Hodas

Used 1+ times

FREE Resource

39 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the Model of Computer Security, what does 'Protection' stand for?

The actions taken after a security breach

The goal of computer security

The process of keeping data intact and unmodified

The actions taken to prevent a security issue before it happens

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'CIA' stand for in the context of Network Security goals?

Calculation, Integration, Authentication

Confidentiality, Integrity, Availability

Control, Inspection, Authorization

Connection, Identification, Authorization

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of maintaining 'Confidentiality' in Network Security?

Ensuring data is not revealed to unauthorized entities

Making sure data is accessible to allowed users

Keeping data intact and not modified or corrupted

Protecting systems from cyber attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does integrity in cybersecurity refer to?

Protection against unauthorized access

Protection against data loss

Protection against unauthorized modification

Protection against software piracy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "Availability" in cybersecurity refer to?

Ensuring that data is not changed by unauthorized individuals

Ensuring that data is kept secret and private

Protection against denial of service

Ensuring that data is accessible to authorized users

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a breach of confidentiality?

A DDoS attack that takes down a website

A virus that corrupts data on a computer

NSA leaks of government data by Edward Snowden

A firewall that fails to filter out malicious traffic

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common reason for a loss of availability in data?

A Distributed Denial of Service (DDoS) attack.

A virus infection.

Physical damage to storage devices.

Unauthorized data encryption.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?