Unit 1 - CyberPatriot Open Notes Test

Unit 1 - CyberPatriot Open Notes Test

9th Grade

34 Qs

quiz-placeholder

Similar activities

Chapter 2.2.2 RFID Technology

Chapter 2.2.2 RFID Technology

7th Grade - University

35 Qs

Networking Week 6

Networking Week 6

3rd Grade - University

39 Qs

IOT & DSI

IOT & DSI

9th Grade

30 Qs

BSFC IT Taster Session Quiz

BSFC IT Taster Session Quiz

9th - 10th Grade

39 Qs

CSF Chapter 6 - 2024

CSF Chapter 6 - 2024

9th - 12th Grade

32 Qs

Quiz 3.1 - Operating Systems

Quiz 3.1 - Operating Systems

9th - 12th Grade

29 Qs

 Internet Basics Quiz

Internet Basics Quiz

6th Grade - University

30 Qs

Excel Summative Test

Excel Summative Test

9th Grade

30 Qs

Unit 1 - CyberPatriot Open Notes Test

Unit 1 - CyberPatriot Open Notes Test

Assessment

Quiz

Information Technology (IT)

9th Grade

Easy

Created by

Thomas Archer

Used 1+ times

FREE Resource

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the special name for the 3 foundational principles of Cybersecurity that are all inter-related?

The Golden Rules

The Diamond Principles

The CIA Triad

The Pyramid Principles

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following foundational concepts in cybersecurity means making sure the data and information is known only by the people that are supposed to know it?

Confidentiality

Integrity

Availability

Operationality

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following foundational concepts of cybersecurity means making sure the data and information represented remains true, unchanged, and accurate?

Confidentiality

Integrity

Availability

Operationality

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following foundational concepts of cybersecurity means being able to access and get to the information and data at the time when you need to do so?

Confidentiality

Integrity

Availability

Operationality

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

In a company, what is the primary goal of confidentiality in cyber security when Ethan, an authorized employee, accesses sensitive project data?

To speed up data processing

To ensure that only authorized users like Ethan can access specific data

To protect systems from malware

To monitor data usage

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You receive an e-mail message. The sender of the message claims to be a bank executive and wants your personal information to open an account for you. Which one of the following terms describes this activity?
Phishing
Pirating
Spyware
Hacking

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is NOT a safe practice when using public Wi-Fi?

Using a VPN

Accessing sensitive personal accounts

Keeping your Wi-Fi turned off when not in use

Making sure the network is secure before connecting

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?