Understanding Cyber Security Fundamentals

Understanding Cyber Security Fundamentals

Professional Development

30 Qs

quiz-placeholder

Similar activities

Ransomware 1

Ransomware 1

Professional Development

29 Qs

Computer Architecture

Computer Architecture

Professional Development

30 Qs

Comptia Security+ Understanding Application Attacks and security

Comptia Security+ Understanding Application Attacks and security

Professional Development

30 Qs

FR-MPA.06-Network Administrator Madya (TEORI)

FR-MPA.06-Network Administrator Madya (TEORI)

University - Professional Development

25 Qs

A+ Core2 Day5a manage and configure basic security Windows

A+ Core2 Day5a manage and configure basic security Windows

Professional Development

30 Qs

ICDL- Online Collaboration Quiz 3

ICDL- Online Collaboration Quiz 3

Professional Development

25 Qs

Sec+ Day 2 Cryptographic Solutions and Identity Management Quiz

Sec+ Day 2 Cryptographic Solutions and Identity Management Quiz

Professional Development

30 Qs

A+ 1102 Day 4a ITSA 2.1 Summarize security measures

A+ 1102 Day 4a ITSA 2.1 Summarize security measures

Professional Development

35 Qs

Understanding Cyber Security Fundamentals

Understanding Cyber Security Fundamentals

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Darshankumar Chauhan

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of the CIA triad ensures that information is only accessible to those authorised to have access?

Integrity

Confidentiality

Availability

Accountability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the 'I' in the CIA triad stand for?

Identification

Integrity

Information

Inspection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes 'availability' in the context of cyber security?

Ensuring data is accurate and unaltered

Ensuring data is accessible when needed

Ensuring only authorised users can access data

Ensuring users are held accountable for their actions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is commonly used for user authentication?

Passwords

Data encryption

Firewalls

Data masking

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a principle of the CIA triad?

Confidentiality

Integrity

Availability

Authenticity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of data integrity techniques?

To prevent unauthorised access

To ensure data is not altered without detection

To make data available at all times

To identify users

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a data integrity technique?

Hashing

Phishing

Social engineering

Spamming

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?