Tech+ 4.1 Open Book Questions

Tech+ 4.1 Open Book Questions

10th Grade

38 Qs

quiz-placeholder

Similar activities

Linha de comandos do Linux

Linha de comandos do Linux

9th - 12th Grade

33 Qs

STS Genap Kelas X TP 2024/2025

STS Genap Kelas X TP 2024/2025

10th Grade

35 Qs

Pengenalan Microsoft Word

Pengenalan Microsoft Word

10th Grade

40 Qs

G10 - Ôn tập cuối kì mùa Đông

G10 - Ôn tập cuối kì mùa Đông

10th Grade

34 Qs

GS6-LV1-S-3

GS6-LV1-S-3

3rd Grade - University

33 Qs

Word

Word

10th Grade - University

40 Qs

Information

Information

8th Grade - University

40 Qs

LATIHAN PERSIAPAN AM INFORMATIKA

LATIHAN PERSIAPAN AM INFORMATIKA

9th Grade - University

40 Qs

Tech+ 4.1 Open Book Questions

Tech+ 4.1 Open Book Questions

Assessment

Quiz

Information Technology (IT)

10th Grade

Practice Problem

Medium

Created by

Sean Carchidi

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

38 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What are the three principles of the CIA Triad in information security?

Confidentiality, Integrity, Availability

Confidentiality, Integrity, Accessibility

Confidentiality, Information, Availability

Confidentiality, Integrity, Authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The CIA Triad can also be referred to as "AIC" to avoid confusion with which organization?

Central Intelligence Agency

Central Information Agency

Central Integrity Agency

Central Availability Agency

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

In the context of the CIA Triad, which principle ensures that information is only accessible to those who have been explicitly authorized?

A) Confidentiality

B) Integrity

C) Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What is non-repudiation in the context of cybersecurity?

The ability to deny sending a message

The assurance that someone cannot deny the validity of something

The process of encrypting data

The method of detecting threats.

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The NIST Cybersecurity Framework includes several functions. Which of the following is NOT one of them?

A) Identify

B) Protect

C) Attack

D) Recover

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Fill in the blank: The NIST Cybersecurity Framework function that involves restoring systems and data if other controls fail is called ________.

A) Identify

B) Protect

C) Detect

D) Recover

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Why are computers considered high-value targets?

Because they are cheap

Because they store data

Because they are easy to steal

Because they are lightweight.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?