What are the objectives of ensuring data integrity? (Choose two correct answers)

CCST Cyber Quiz Test #1

Quiz
•
Information Technology (IT)
•
9th Grade
•
Medium
Linda Berkheimer
Used 2+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 2 pts
Data is unaltered during transit
Data is not changed by unauthorized entities
Data is encrypted while in transit and when stored on disks
Access to the data is authenticated
Data is available all the time
Answer explanation
Explanation: The objectives for data integrity include data not being altered during transit and not being changed by unauthorized entities. Authentication and encryption are methods to ensure confidentiality. Data being available all the time is the goal of availability.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
Contact information
Next appointment
Patient records
First and last name
Answer explanation
Explanation: An email message is transmitted in plain text and can be read by anyone who has access to the data while it is en route to a destination. Patient records include confidential or sensitive information that should be transmitted in a secure manner.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best way to avoid getting spyware on a machine?
Install the latest antivirus updates
Install the latest web browser updates
Install software only from trusted websites
Install the latest operating system updates
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?
ISC2 Certified Information Systems Security Professional
ISACA CSX Cybersecurity Fundamentals
Microsoft Technology Associate Security Fundamentals
EC Council Certified Ethical Hacker
CompTIA Security+
Answer explanation
Explanation: This is an entry-level security certification that meets the U.S. Department of Defense Directive 8570.01-M requirements, which is an important item for anyone looking to work in IT security for the federal government.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?
EC Council Certified Ethical Hacker
Palo Alto Networks Certified Cybersecurity Associate
ISC2 Certified Information Systems Security Professional
Microsoft Technology Associate Security Fundamentals
CompTIA Security+
Answer explanation
Explanation: This certification tests your understanding and knowledge of how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker but in a lawful and legitimate manne
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
Buffer overflow
Race conditions
Weaknesses in security practices
Non-validated input
Access control problems
Answer explanation
Explanation: Systems and sensitive data can be protected through techniques such as authentication, authorization and encryption. Developers should stick to using security techniques and libraries that have already been created, tested and verified and should not attempt to create their own security algorithms. These will only likely introduce new vulnerabilities.
7.
MULTIPLE SELECT QUESTION
30 sec • 2 pts
Which of the following security implementations use biometrics? (Choose two correct answers)
Fingerprint
Phone
Credit card
Voice recognition
Fob
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
ICS: Unit 3 Review

Quiz
•
9th Grade
10 questions
Basic Cybersecurity Quiz

Quiz
•
9th - 12th Grade
10 questions
Network secutiry

Quiz
•
9th Grade - University
15 questions
Lesson 3: Equal Access

Quiz
•
9th - 12th Grade
10 questions
Secure Remote Access for Small Businesses Quiz

Quiz
•
9th - 12th Grade
12 questions
Практична робота №5 "Інформаційна безпека"

Quiz
•
9th Grade
15 questions
Keamanan Informasi Kelas 9

Quiz
•
9th Grade
10 questions
POS TES

Quiz
•
9th Grade - University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade
Discover more resources for Information Technology (IT)
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
24 questions
LSO - Virus, Bacteria, Classification - sol review 2025

Quiz
•
9th Grade
65 questions
MegaQuiz v2 2025

Quiz
•
9th - 12th Grade
10 questions
GPA Lesson

Lesson
•
9th - 12th Grade
15 questions
SMART Goals

Quiz
•
8th - 12th Grade
10 questions
Exponential Growth and Decay Word Problems

Quiz
•
9th Grade