CIA, Actors & Authentication

CIA, Actors & Authentication

11th Grade

23 Qs

quiz-placeholder

Similar activities

Assessment Knowledge Quiz

Assessment Knowledge Quiz

6th Grade - University

20 Qs

Digital Asset Review

Digital Asset Review

10th Grade - University

26 Qs

Administrasi Server Jaringan - XI TKJ

Administrasi Server Jaringan - XI TKJ

11th Grade - University

25 Qs

adminstrasi sistem jaringan

adminstrasi sistem jaringan

11th Grade

20 Qs

Quiz Pengetahuan Informatika

Quiz Pengetahuan Informatika

7th Grade - University

23 Qs

Unit 2 The Internet

Unit 2 The Internet

9th - 12th Grade

18 Qs

Cyber I - 1.1 Quiz 2 - CIA Triad & Authentication

Cyber I - 1.1 Quiz 2 - CIA Triad & Authentication

9th - 12th Grade

22 Qs

CIA, Actors & Authentication

CIA, Actors & Authentication

Assessment

Quiz

Information Technology (IT)

11th Grade

Easy

Created by

BYRONELLE WILLIAMS

Used 1+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The skill level of _________ is always considered low as they rely on pre-existing tools rather than developing their own exploits.

state actors

hactivists

script kiddies

nation states

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The attacks of ________ are driven by cause rather than financial gain, and they are typically motivated by political, commercial, or economic ideologies.

shadow IT

insider threats

organized crime

hacktivists

3.

MATCH QUESTION

1 min • 1 pt

Match the following types of hackers

identify & fix vulnerabilities

grey hat

illegal activities for personal intent

white hat

malicious, cause harm, want profit

black hat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ have extensive resources and capabilities, often with full support of their governments, allowing them to carry out sophisticated exploits.

State Actors

Nation States

Shadow IT

Organized Crime Groups

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ are generally motivated by financial gain or power. They might sell data on the dark web, conduct espionage or disrupt normal business operations until ransom is paid.

Organized Crime Groups

Hacktivists

Script Kiddies

Insider Threats

6.

MATCH QUESTION

1 min • 1 pt

Match the following

Ensures timely access to data

Accountability

Not part of the CIA Triad

Confidentiality

Ensures data remains accurate

Availability

Ensures authorized access

Integrity

7.

MATCH QUESTION

1 min • 1 pt

Match the following AAA frameworks and components

Verifies the identity of users / systems

Accounting

Defines resources they can access

Authentication

Tracks activities

Authorization

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?