Cybersecurity Review #3

Cybersecurity Review #3

10th Grade

10 Qs

quiz-placeholder

Similar activities

Confidentiality, Integrity, and Availability

Confidentiality, Integrity, and Availability

9th - 12th Grade

11 Qs

Quis Keamanan Data

Quis Keamanan Data

10th Grade

10 Qs

Activity 2.3 - Principles of Cybersecurity

Activity 2.3 - Principles of Cybersecurity

9th - 12th Grade

8 Qs

BTEC DIT C3 LAC - Shared Data

BTEC DIT C3 LAC - Shared Data

10th Grade

10 Qs

CIA Triad

CIA Triad

10th Grade

8 Qs

Unit 1 - 1.2.1 - CIA Triad & AAA

Unit 1 - 1.2.1 - CIA Triad & AAA

10th Grade

8 Qs

InfoSec: C.I.A. Triangle

InfoSec: C.I.A. Triangle

10th Grade - University

10 Qs

Cybersecurity Review #3

Cybersecurity Review #3

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Edward Barcenas

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Availability in the CIA Triad guarantee?

Systems and data are accessible by authorized users when needed

Information is stored permanently

Access is restricted to specific times

Only administrators have access to data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a malicious attempt to disrupt, damage, or gain unauthorized access to computer systems or networks?

Cybersecurity

Ransomware

Cyber Attack

Internet of Things

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a cyber attack?

Sharing files on a network

Hacking into a system to steal sensitive data

Installing a software update

Backing up important files

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the Internet of Things (IoT)?

A collection of disconnected devices

A network of interconnected physical devices that communicate wirelessly

The process of storing data in the cloud

A type of software for data analysis

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of the CIA Triad?

Confidentiality

Integrity

Accuracy

Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if your system is attacked by ransomware?

Immediately pay the ransom to regain access

Disconnect the system from the network and report the attack to IT or authorities

Share your system password with the attacker

Attempt to recover files without notifying anyone

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Scenario: A company is implementing new security measures to protect sensitive client data. They want to ensure that only authorized personnel can access this data and that the data remains accurate and intact during transmission. Which of the following best describes the primary focus of their security measures?

Ensuring that the data is kept confidential and only accessible to authorized personnel.

Ensuring that data is backed up regularly and stored securely.

Ensuring that the data is accurate and has not been altered during transmission.

Ensuring that the system is available and operational at all times.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?