Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

21 Qs

quiz-placeholder

Similar activities

Ethics and Laws in Counseling

Ethics and Laws in Counseling

9th - 12th Grade

17 Qs

Sensory properties of food

Sensory properties of food

11th - 12th Grade

20 Qs

Review for Quarter 1 module in PR2

Review for Quarter 1 module in PR2

12th Grade

20 Qs

Information Privacy, Security, and Confidentiality Quiz

Information Privacy, Security, and Confidentiality Quiz

12th Grade

20 Qs

CAFS: Types and Sources of Data

CAFS: Types and Sources of Data

12th Grade

20 Qs

PR 1 - QUIZ 1 v.2

PR 1 - QUIZ 1 v.2

11th Grade - University

20 Qs

Ethics Experiments Statistics

Ethics Experiments Statistics

10th - 12th Grade

19 Qs

N6 AIT - Benefits of Database Storage

N6 AIT - Benefits of Database Storage

12th Grade

20 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Other

12th Grade

Easy

Created by

Joshua Krzemien

Used 6+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three components of the CIA Triad in cybersecurity?

Confidentiality, Integrity, Availability

Confidentiality, Integrity, Accessibility

Confidentiality, Information, Availability

Confidentiality, Information, Accessibility

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'Confidentiality' in the CIA Triad ensure?

That data is accessible at any time and anywhere to authorized users

That only authorized users can view the information

That the information is correct and reliable

That data is encrypted during transmission

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of 'Data in transit'?

USB Flash Drive

Data Entry

VPN or SSL

Data Backup

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is 'Data in process'?

Data that is being transmitted between different locations

Data that is stored on a storage device

Data that is being collected and manipulated to produce meaningful information

Data that is encrypted for security purposes

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of 'Data at rest'?

Sneakernet

Data Backup

Wireless Networks

Data Entry

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Technical Controls?

Policies and procedures

Firewalls, Encryption, and Intrusion Detection Systems (IDS)

User training programs

Physical security measures

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Policy Controls?

Firewalls and IDS

Encryption methods

AUP (Acceptable Use Policy), Remote Access Policies, and Network Maintenance Policies

Physical barriers

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?