Unit 1 Test

Unit 1 Test

11th Grade

28 Qs

quiz-placeholder

Similar activities

IDAM and Network Architecture

IDAM and Network Architecture

11th Grade

30 Qs

Resiliency and Site Security

Resiliency and Site Security

9th Grade - University

25 Qs

Quiz 2  WordPress Intro

Quiz 2 WordPress Intro

8th Grade - University

24 Qs

Types of Networks - LANs and WANs

Types of Networks - LANs and WANs

10th - 11th Grade

23 Qs

Networking Essentials Chapter 6 Review

Networking Essentials Chapter 6 Review

9th Grade - University

25 Qs

Networking v6 Ch 13 Quiz Review

Networking v6 Ch 13 Quiz Review

9th - 12th Grade

25 Qs

CyberSecurity - Controls and Responses (Risk, Adversity & Trust)

CyberSecurity - Controls and Responses (Risk, Adversity & Trust)

9th - 12th Grade

23 Qs

Cyber security

Cyber security

11th Grade

26 Qs

Unit 1 Test

Unit 1 Test

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Victoria Berkowitz

Used 4+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the primary motivation for black hat hackers?

Financial gain

Ethical hacking

System improvement

Research

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What type of threat actor is the United States considered in the Stuxnet attack?

Organized Crime

Hacktivist

Competition

APT

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What are the three core components of the CIA Triad?

Confidentiality, Integrity, and Auditing

Confidentiality, Availability, and Integrity

Confidentiality, Authentication, and Availability

Confidentiality, Integrity, and Authorization

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which principle of the CIA Triad focuses on ensuring that data is accurate and reliable?

Confidentiality

Availability

Authentication

Integrity

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What type of hacker typically follows ethical guidelines to improve security?

Black hat hacker

Grey hat hacker

White hat hacker

Blue hat hacker

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which framework is used in network security for ensuring proper user access and tracking?

AAA framework

CIA Triad

NIST framework

ISO/IEC 27001

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the term for technology within an organization that operates without official approval?

Rogue IT

Shadow IT

Ghost IT

Phantom IT

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?