Fbla Cyber Security

Fbla Cyber Security

9th - 10th Grade

10 Qs

quiz-placeholder

Similar activities

The internet and its uses

The internet and its uses

10th Grade

10 Qs

Student Privacy and Security

Student Privacy and Security

KG - 12th Grade

10 Qs

Lesson 1 (CIW JavaScript)

Lesson 1 (CIW JavaScript)

9th - 12th Grade

14 Qs

CSS Quiz 4

CSS Quiz 4

9th - 12th Grade

10 Qs

CS: World Wide Web

CS: World Wide Web

10th Grade

11 Qs

Data Protection Act 1988

Data Protection Act 1988

6th - 12th Grade

12 Qs

Hardware Functions

Hardware Functions

10th - 12th Grade

12 Qs

Cyber 4.1.8 and 2.7.2 Data Sanitization / Destruction

Cyber 4.1.8 and 2.7.2 Data Sanitization / Destruction

9th - 12th Grade

11 Qs

Fbla Cyber Security

Fbla Cyber Security

Assessment

Quiz

Professional Development, Computers

9th - 10th Grade

Hard

Created by

Madison Paul

Used 444+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following exposures associated with the spoiling of sensitive reports for offline printing could be considered the most serious?

Other unauthorized copies of reports could be printed

Sensitive data may be read by operators

Data cannot be altered without authorization

output would be lost in case of system failure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the Biba security model concerned with?

Reliability

Availability

Integrity

Confidentiality

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is not a common integrity goal?

Maintain internal and external consistency

Prevent unauthorized users from making modifications

Prevent paths that could lead to inappropriate disclosure

Prevent authorized users from making improper modifications

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Attributable data should be:

Often traced to individuals responsible for observing and recording the data

Never traced to individuals responsible for observing and recording the data

Sometimes traced to individuals responsible for observing and recording the data

Always traced to individuals responsible for observing and recording the data

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following questions is less likely to help in assessing controls covering audit trails?

Is there separation of duties between security personnel who administer the access control function and those who administer the audit trail?

Are incidental monitored and tracked until resolved?

Is access to online logs strictly controlled?

Does the audit trail provide a trace of user actions?

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following is not a method to protect objects Andy the data within the objects?

Layering

Data mining

Data hiding

Abstraction

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a locking device that prevents unauthorized unplugging of cables from computer devices called?

Preset locks

Door delays

Cable trap

Slot locks

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?