Cybersecurity

Cybersecurity

12th Grade

24 Qs

quiz-placeholder

Similar activities

Managing User Security 3.1

Managing User Security 3.1

9th - 12th Grade

25 Qs

Unit 5 Review 1

Unit 5 Review 1

12th Grade

20 Qs

Cyber EOP - Physical Security By Mr. B

Cyber EOP - Physical Security By Mr. B

12th Grade - University

20 Qs

Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

CyberSecurity - Controls and Responses (Risk, Adversity & Trust)

CyberSecurity - Controls and Responses (Risk, Adversity & Trust)

9th - 12th Grade

23 Qs

Final cybersecurity exam (A)

Final cybersecurity exam (A)

9th - 12th Grade

21 Qs

Cybersecurity Legislation and Standards Quiz

Cybersecurity Legislation and Standards Quiz

12th Grade

20 Qs

Authentication

Authentication

11th - 12th Grade

19 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Ron F.

Used 4+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What are the three main goals of cybersecurity?
efficiency, speed, availability
secrecy, integrity, availability
confidentiality, complexity, security
secrecy, speed, control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is an attack on secrecy?
data breaches revealing credit card information
denial of service attacks
masquerading emails
overloading websites

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What does integrity in cybersecurity mean?
only authorized people can access data
only authorized people can modify systems and data
only authorized people can deny access
only authorized people can create data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
An example of an availability attack is:
a data breach
a masquerading email
a denial of service attack
a phishing scam

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is a Threat Model?
a profile of potential attackers
a type of cybersecurity software
a data protection technique
a physical security measure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is an Attack Vector?
the means by which an attack is carried out
a type of firewall
a security protocol
an encryption method

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is the process of confirming a user's identity called?
authorization
authentication
verification
encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?