Cybersecurity

Cybersecurity

12th Grade

24 Qs

quiz-placeholder

Similar activities

Cybersecurity Exam

Cybersecurity Exam

11th - 12th Grade

20 Qs

Cybersecurity - Software Security

Cybersecurity - Software Security

12th Grade

20 Qs

security best practices

security best practices

10th Grade - University

20 Qs

L3: Understanding Security Policies

L3: Understanding Security Policies

9th - 12th Grade

21 Qs

Cyber 2 Module 9

Cyber 2 Module 9

9th Grade - Professional Development

21 Qs

Quiz1_12&11_2t_20214

Quiz1_12&11_2t_20214

12th Grade

20 Qs

Cybersecurity Quiz 2

Cybersecurity Quiz 2

10th Grade - University

25 Qs

Understanding Security Concepts Quiz

Understanding Security Concepts Quiz

12th Grade

20 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Ron F.

Used 4+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What are the three main goals of cybersecurity?
efficiency, speed, availability
secrecy, integrity, availability
confidentiality, complexity, security
secrecy, speed, control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is an attack on secrecy?
data breaches revealing credit card information
denial of service attacks
masquerading emails
overloading websites

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What does integrity in cybersecurity mean?
only authorized people can access data
only authorized people can modify systems and data
only authorized people can deny access
only authorized people can create data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
An example of an availability attack is:
a data breach
a masquerading email
a denial of service attack
a phishing scam

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is a Threat Model?
a profile of potential attackers
a type of cybersecurity software
a data protection technique
a physical security measure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is an Attack Vector?
the means by which an attack is carried out
a type of firewall
a security protocol
an encryption method

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What is the process of confirming a user's identity called?
authorization
authentication
verification
encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?