CCST Cyber Quiz Test #1

CCST Cyber Quiz Test #1

9th Grade

10 Qs

quiz-placeholder

Similar activities

SSC Summer Camp Post-Quiz

SSC Summer Camp Post-Quiz

9th - 12th Grade

10 Qs

Network Hardware & Components Quiz

Network Hardware & Components Quiz

9th Grade

15 Qs

Lesson 3: Impact of IT systems

Lesson 3: Impact of IT systems

9th - 12th Grade

15 Qs

Network secutiry

Network secutiry

9th Grade - University

10 Qs

Lesson 3: Equal Access

Lesson 3: Equal Access

9th - 12th Grade

15 Qs

Практична робота №5 "Інформаційна безпека"

Практична робота №5 "Інформаційна безпека"

9th Grade

12 Qs

Pemahaman tentang Malware

Pemahaman tentang Malware

9th Grade

10 Qs

Functional Digital Skills Quiz May 2025

Functional Digital Skills Quiz May 2025

9th - 10th Grade

14 Qs

CCST Cyber Quiz Test #1

CCST Cyber Quiz Test #1

Assessment

Quiz

Information Technology (IT)

9th Grade

Medium

Created by

Linda Berkheimer

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

What are the objectives of ensuring data integrity? (Choose two correct answers)

Data is unaltered during transit

Data is not changed by unauthorized entities

Data is encrypted while in transit and when stored on disks

Access to the data is authenticated

Data is available all the time

Answer explanation

Explanation: The objectives for data integrity include data not being altered during transit and not being changed by unauthorized entities. Authentication and encryption are methods to ensure confidentiality. Data being available all the time is the goal of availability.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?

Contact information

Next appointment

Patient records

First and last name

Answer explanation

Explanation: An email message is transmitted in plain text and can be read by anyone who has access to the data while it is en route to a destination. Patient records include confidential or sensitive information that should be transmitted in a secure manner.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to avoid getting spyware on a machine?

Install the latest antivirus updates

Install the latest web browser updates

Install software only from trusted websites

Install the latest operating system updates

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?

ISC2 Certified Information Systems Security Professional

ISACA CSX Cybersecurity Fundamentals

Microsoft Technology Associate Security Fundamentals

EC Council Certified Ethical Hacker

CompTIA Security+

Answer explanation

Explanation: This is an entry-level security certification that meets the U.S. Department of Defense Directive 8570.01-M requirements, which is an important item for anyone looking to work in IT security for the federal government.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?

EC Council Certified Ethical Hacker

Palo Alto Networks Certified Cybersecurity Associate

ISC2 Certified Information Systems Security Professional

Microsoft Technology Associate Security Fundamentals

CompTIA Security+

Answer explanation

Explanation: This certification tests your understanding and knowledge of how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker but in a lawful and legitimate manne

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?

Buffer overflow

Race conditions

Weaknesses in security practices

Non-validated input

Access control problems

Answer explanation

Explanation: Systems and sensitive data can be protected through techniques such as authentication, authorization and encryption. Developers should stick to using security techniques and libraries that have already been created, tested and verified and should not attempt to create their own security algorithms. These will only likely introduce new vulnerabilities.

7.

MULTIPLE SELECT QUESTION

30 sec • 2 pts

Which of the following security implementations use biometrics? (Choose two correct answers)

Fingerprint

Phone

Credit card

Voice recognition

Fob

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?