
Security Concepts Quiz
Authored by Ariel Contreras
Instructional Technology
12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is considered a confidentiality concern in data security?
Man-in-the-middle
Denial of service
Snooping
Power outage
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a factor used in multifactor authentication?
Permissions
Logs
Password
Receipt
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of the least privilege model in authorization?
To provide maximum access to all users
To ensure users have the minimum level of access necessary
To track user activities
To store user passwords
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one way hackers gain unauthorized access to a server or an operating system?
By installing antivirus software
By gaining remote access
By updating the operating system
By creating a new user account
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of intellectual property?
Data
Digital products
Trademarks
Business decisions
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the three components of the CIA triad in information security?
Confidentiality, Integrity, Availability
Confidentiality, Integrity, Accessibility
Confidentiality, Information, Availability
Confidentiality, Integrity, Authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of social engineering mentioned in the provided material?
Wiretapping
Dumpster diving
Phishing
Snooping
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?