
Fbla Cyber Security

Quiz
•
Professional Development, Computers
•
9th - 10th Grade
•
Hard
Madison Paul
Used 448+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following exposures associated with the spoiling of sensitive reports for offline printing could be considered the most serious?
Other unauthorized copies of reports could be printed
Sensitive data may be read by operators
Data cannot be altered without authorization
output would be lost in case of system failure
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the Biba security model concerned with?
Reliability
Availability
Integrity
Confidentiality
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following is not a common integrity goal?
Maintain internal and external consistency
Prevent unauthorized users from making modifications
Prevent paths that could lead to inappropriate disclosure
Prevent authorized users from making improper modifications
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Attributable data should be:
Often traced to individuals responsible for observing and recording the data
Never traced to individuals responsible for observing and recording the data
Sometimes traced to individuals responsible for observing and recording the data
Always traced to individuals responsible for observing and recording the data
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following questions is less likely to help in assessing controls covering audit trails?
Is there separation of duties between security personnel who administer the access control function and those who administer the audit trail?
Are incidental monitored and tracked until resolved?
Is access to online logs strictly controlled?
Does the audit trail provide a trace of user actions?
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following is not a method to protect objects Andy the data within the objects?
Layering
Data mining
Data hiding
Abstraction
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a locking device that prevents unauthorized unplugging of cables from computer devices called?
Preset locks
Door delays
Cable trap
Slot locks
Create a free account and access millions of resources
Similar Resources on Wayground
13 questions
Data Visualization Quiz

Quiz
•
9th - 12th Grade
12 questions
AP CSP Unit 1 Vocab (Code.org)

Quiz
•
9th - 12th Grade
15 questions
System Concept

Quiz
•
5th Grade - University
10 questions
DATA AND INFORMATION

Quiz
•
9th Grade
12 questions
Computer Components

Quiz
•
9th Grade
9 questions
Topic Area 4: Cybersecurity and Legislation

Quiz
•
9th - 10th Grade
10 questions
Data Protection Act 2018

Quiz
•
10th Grade
15 questions
CSEC ICT June 2020 Paper 1 Part 1

Quiz
•
9th - 10th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade