Cybersecurity

Cybersecurity

12th Grade

24 Qs

quiz-placeholder

Similar activities

Google SketchUp Tool

Google SketchUp Tool

KG - University

20 Qs

REMEDI PAS - DESAIN DAN KOMP. GRAFIS

REMEDI PAS - DESAIN DAN KOMP. GRAFIS

12th Grade

20 Qs

Visual Basic Assessment

Visual Basic Assessment

11th - 12th Grade

21 Qs

tik 9  part 2

tik 9 part 2

12th Grade

20 Qs

CORLANG Week6-7

CORLANG Week6-7

10th Grade - University

20 Qs

business 1.4 revision

business 1.4 revision

KG - Professional Development

20 Qs

Penilaian Akhir Semester (PAS) Pemrograman Web dan PPL

Penilaian Akhir Semester (PAS) Pemrograman Web dan PPL

12th Grade

20 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Ron F.

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What are the three main goals of cybersecurity?

efficiency, speed, availability
secrecy, integrity, availability
confidentiality, complexity, security
secrecy, speed, control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is an attack on secrecy?

data breaches revealing credit card information
denial of service attacks
masquerading emails
overloading websites

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What does integrity in cybersecurity mean?

only authorized people can access data
only authorized people can modify systems and data
only authorized people can deny access
only authorized people can create data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

An example of an availability attack is:

a data breach
a masquerading email
a denial of service attack
a phishing scam

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is a Threat Model?

a profile of potential attackers
a type of cybersecurity software
a data protection technique
a physical security measure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is an Attack Vector?

the means by which an attack is carried out
a type of firewall
a security protocol
an encryption method

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the process of confirming a user's identity called?

authorization
authentication
verification
encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?