CIA Triad Summer School Exam 2

CIA Triad Summer School Exam 2

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

J808 4.1 Types of threats

J808 4.1 Types of threats

9th - 11th Grade

20 Qs

CYBERSECURITY EXAM

CYBERSECURITY EXAM

9th - 12th Grade

20 Qs

Cybersecurity

Cybersecurity

9th - 12th Grade

15 Qs

Privacy and security

Privacy and security

7th - 9th Grade

20 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

(L2) 1.4 Network Security

(L2) 1.4 Network Security

10th Grade

19 Qs

CIA Triad Summer School Exam 2

CIA Triad Summer School Exam 2

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Joseph Carpenter

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Cynthia discovers that she has the ability to modify the lunch menu posted on her school’s website. She edits the website so for lunch every day, it says “Green Eggs and Ham”.

Which part of the CIA triad was broken?

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Alice is checking her grades on a school computer in the library, and she forgets to log out before she leaves. Bob gets on the computer after her, and he sees her grades for all of her classes.

Which part of the CIA triad was broken?

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following devices is not a part of the Internet of Things?

A watch that allows you to measure and track your activity through a mobile app

A security system that lets you remotely monitor your home

A physical combination padlock for your gym locker

A car with a built-in navigation system Incorrect Question: 7

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the primary goal of a ransomware attack?

Stealing information and data

Deactivating and destroying devices

Shutting down network access

Obtaining money through threats

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Sarah puts a lock on her diary so only she can read it. Her little brother breaks the lock and reads her diary.

Which part of the CIA triad was broken?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be the primary focus of keeping information secure?

Implementing a strong password policy

Ensuring the confidentiality, integrity, and availability of data

Encrypting all personal data

Educating users on the dangers of phishing attempts

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is comprised of millions of smart devices and sensors connected to the internet?

the cloud

the data center

the internet of things

the CIA triad

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?