Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

quiz-placeholder

Similar activities

Review: Information Assurance and Security

Review: Information Assurance and Security

University

20 Qs

Cyber Security

Cyber Security

University

23 Qs

CO2521 Recap Week 09

CO2521 Recap Week 09

University

22 Qs

The CIA Triad

The CIA Triad

9th Grade

20 Qs

Cybersecurity Exam

Cybersecurity Exam

11th - 12th Grade

20 Qs

Understanding Security Concepts Quiz

Understanding Security Concepts Quiz

12th Grade

20 Qs

Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

9th Grade - University

20 Qs

Cybersecurity Quiz 2

Cybersecurity Quiz 2

10th Grade - University

25 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

Assessment

Quiz

Computers

9th Grade - University

Medium

Created by

Paul Zettler

Used 58+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This cybersecurity goal or principle refers to the accuracy, consistency, and trustworthiness of data.

Integrity

Confidentiality

Availability

Accountability

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This cybersecurity goal or principle involves preventing the disclosure of information to unauthorized people, resources, or processes.

Integrity

Confidentiality

Availability

Accountability

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

The first dimension of the Cybersecurity Cube lists these three goals or foundation principles.

Transmission, Storage, Processing

Confidentiality, Integrity, Availability

Technology, Policies and Practice, People

Concern, Irritability, Assurances

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

These are the three dimensions of the Cybersecurity Cube.

Transmission, Storage, Processing

Confidentiality, Integrity, Availability

Technology, Policies and Practice, People

Security Principles, Information States, Countermeasures

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is the process of keeping track of what all the users do within your systems.

Accounting

Authorization

Authentication

Availability

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is the process of deciding what resources and data a user can access along with the operations that a user is allowed to perform.

Accounting

Authorization

Authentication

Availability

7.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

These are two methods used to keep data confidential.

(Pick 2)

Accounting

Authorization

Authentication

Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?