Fbla Cyber Security

Fbla Cyber Security

9th - 10th Grade

10 Qs

quiz-placeholder

Similar activities

IGCSE Data Manipulation Grade 11 (2021-2022)

IGCSE Data Manipulation Grade 11 (2021-2022)

10th - 11th Grade

13 Qs

What is the Web? Quiz Review/Retake

What is the Web? Quiz Review/Retake

9th - 12th Grade

10 Qs

1.1 System Architecture

1.1 System Architecture

10th Grade

14 Qs

Creating a Database

Creating a Database

7th - 9th Grade

15 Qs

Data Types in Python

Data Types in Python

9th - 12th Grade

10 Qs

Data and quality of data

Data and quality of data

10th Grade

10 Qs

advanced ms access

advanced ms access

10th - 11th Grade

11 Qs

Fbla Cyber Security

Fbla Cyber Security

Assessment

Quiz

Professional Development, Computers

9th - 10th Grade

Hard

Created by

Madison Paul

Used 448+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following exposures associated with the spoiling of sensitive reports for offline printing could be considered the most serious?

Other unauthorized copies of reports could be printed

Sensitive data may be read by operators

Data cannot be altered without authorization

output would be lost in case of system failure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the Biba security model concerned with?

Reliability

Availability

Integrity

Confidentiality

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is not a common integrity goal?

Maintain internal and external consistency

Prevent unauthorized users from making modifications

Prevent paths that could lead to inappropriate disclosure

Prevent authorized users from making improper modifications

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Attributable data should be:

Often traced to individuals responsible for observing and recording the data

Never traced to individuals responsible for observing and recording the data

Sometimes traced to individuals responsible for observing and recording the data

Always traced to individuals responsible for observing and recording the data

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following questions is less likely to help in assessing controls covering audit trails?

Is there separation of duties between security personnel who administer the access control function and those who administer the audit trail?

Are incidental monitored and tracked until resolved?

Is access to online logs strictly controlled?

Does the audit trail provide a trace of user actions?

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is not a method to protect objects Andy the data within the objects?

Layering

Data mining

Data hiding

Abstraction

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a locking device that prevents unauthorized unplugging of cables from computer devices called?

Preset locks

Door delays

Cable trap

Slot locks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?