Cybersecurity Chapter 2 Quiz

Cybersecurity Chapter 2 Quiz

12th Grade

21 Qs

quiz-placeholder

Similar activities

2 - Cybersecurity 101

2 - Cybersecurity 101

9th Grade - University

20 Qs

Cyber Security

Cyber Security

9th Grade - University

20 Qs

CSP Units 7 & 8 Vocab Quiz

CSP Units 7 & 8 Vocab Quiz

12th Grade

19 Qs

Fundamentals 18 Understanding DDoS Attacks

Fundamentals 18 Understanding DDoS Attacks

9th Grade - University

20 Qs

MIT_Quiz1

MIT_Quiz1

12th Grade

20 Qs

Ch5 Review, MSCA Ex 70-411 Guide

Ch5 Review, MSCA Ex 70-411 Guide

12th Grade

25 Qs

Quiz 1 - Prinsip dan Konsep keamanan informasi

Quiz 1 - Prinsip dan Konsep keamanan informasi

1st Grade - University

17 Qs

005_AAA Cyber

005_AAA Cyber

12th Grade - University

20 Qs

Cybersecurity Chapter 2 Quiz

Cybersecurity Chapter 2 Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Stella Lai

Used 7+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is identified by the first dimension of the cybersecurity cube?

tools

knowledge

goals

safeguards

rules

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are three types of sensitive information? (Choose three.)

declassified

published

classified

public

PII

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are two common hash functions? (Choose two.)

ECC

Blowfish

MD5

SHA

RC4

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service determines which resources a user can access along with the operations that a user can perform?

authentication

biometric

authorization

accounting

token

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

authentication

confidentiality

nonrepudiation

privacy

integrity

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What three design principles help to ensure high availability? (Choose three.)

detect failures as they occur

eliminate single points of failure

provide for reliable crossover

check for data consistency

use encryption

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

where you are

something you are

something you know

something you do

something you have

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?