
Cybersecurity Quiz 2
Authored by Tan Siewchoo
Computers
10th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the foundational principles identified in the first dimension of the Cybersecurity Cube?
Authentication, Authorization, and Accounting (AAA)
Confidentiality, Integrity, and Availability (CIA)
Encryption, Decryption, and Hashing
Prevention, Detection, and Response (PDR)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the second dimension of the Cybersecurity Cube focus on?
Protecting network infrastructure
Protecting physical security
Protecting the three principles of information security
Protecting the three states of data
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the three possible states of data in cyberspace, as mentioned in the text?
Data in storage, Data at risk, Data in process
Data at rest, Data in motion, Data in use
Data in transit, Data at rest, Data in process
Data encrypted, Data decrypted, Data hashed
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the third dimension of the Cybersecurity Cube define?
The goals of cybersecurity
The states of data in cyberspace
The skills and discipline for protection
The technologies, devices, and products used for protection
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the text(Chapter 2.1) emphasize as necessary in addition to technological tools for cybersecurity professionals to defeat cyber criminals?
Strong physical security
A legal background
Policies, procedures, and guidelines
Advanced encryption algorithms
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT one of the three principles of information security in the first dimension of the Cybersecurity Cube?
Confidentiality
Integrity
Availability
Authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the second dimension of the Cybersecurity Cube focus on protecting?
Network infrastructure
Physical security
The three principles of information security
The three states of data
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Advantages and Disadvantages of Collecting Data
Quiz
•
10th Grade
20 questions
NP IT Quiz ปริศนาไอที #4
Quiz
•
9th - 12th Grade
20 questions
Pretest TIK
Quiz
•
10th Grade
20 questions
Pointers
Quiz
•
12th Grade
21 questions
Google Sheets
Quiz
•
12th Grade
20 questions
4NT CPA WA2 Practice Part 1
Quiz
•
10th Grade
20 questions
Quiz Pemahaman tentang Email
Quiz
•
10th Grade
20 questions
Introduction to Information Technology: Living in the IT Era
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade