Search Header Logo

Cybersecurity Review #3

Authored by Edward Barcenas

Computers

10th Grade

Used 1+ times

Cybersecurity Review #3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Availability in the CIA Triad guarantee?

Systems and data are accessible by authorized users when needed

Information is stored permanently

Access is restricted to specific times

Only administrators have access to data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a malicious attempt to disrupt, damage, or gain unauthorized access to computer systems or networks?

Cybersecurity

Ransomware

Cyber Attack

Internet of Things

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a cyber attack?

Sharing files on a network

Hacking into a system to steal sensitive data

Installing a software update

Backing up important files

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the Internet of Things (IoT)?

A collection of disconnected devices

A network of interconnected physical devices that communicate wirelessly

The process of storing data in the cloud

A type of software for data analysis

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of the CIA Triad?

Confidentiality

Integrity

Accuracy

Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if your system is attacked by ransomware?

Immediately pay the ransom to regain access

Disconnect the system from the network and report the attack to IT or authorities

Share your system password with the attacker

Attempt to recover files without notifying anyone

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Scenario: A company is implementing new security measures to protect sensitive client data. They want to ensure that only authorized personnel can access this data and that the data remains accurate and intact during transmission. Which of the following best describes the primary focus of their security measures?

Ensuring that the data is kept confidential and only accessible to authorized personnel.

Ensuring that data is backed up regularly and stored securely.

Ensuring that the data is accurate and has not been altered during transmission.

Ensuring that the system is available and operational at all times.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?