Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

quiz-placeholder

Similar activities

PTS TIK Kelas 9 Semester Ganjil

PTS TIK Kelas 9 Semester Ganjil

9th Grade

20 Qs

Kuis PPJ - Materi VLSM

Kuis PPJ - Materi VLSM

11th Grade

15 Qs

Assessment 08

Assessment 08

University

15 Qs

Algoritma dan Pemrograman Bab 1

Algoritma dan Pemrograman Bab 1

University

15 Qs

computer

computer

University

17 Qs

kuis informatika perangkat lunak

kuis informatika perangkat lunak

10th - 12th Grade

20 Qs

Text and Image representation

Text and Image representation

11th Grade

22 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

Assessment

Quiz

Computers

9th Grade - University

Practice Problem

Medium

Created by

Paul Zettler

Used 58+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This cybersecurity goal or principle refers to the accuracy, consistency, and trustworthiness of data.

Integrity

Confidentiality

Availability

Accountability

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This cybersecurity goal or principle involves preventing the disclosure of information to unauthorized people, resources, or processes.

Integrity

Confidentiality

Availability

Accountability

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

The first dimension of the Cybersecurity Cube lists these three goals or foundation principles.

Transmission, Storage, Processing

Confidentiality, Integrity, Availability

Technology, Policies and Practice, People

Concern, Irritability, Assurances

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

These are the three dimensions of the Cybersecurity Cube.

Transmission, Storage, Processing

Confidentiality, Integrity, Availability

Technology, Policies and Practice, People

Security Principles, Information States, Countermeasures

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is the process of keeping track of what all the users do within your systems.

Accounting

Authorization

Authentication

Availability

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is the process of deciding what resources and data a user can access along with the operations that a user is allowed to perform.

Accounting

Authorization

Authentication

Availability

7.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

These are two methods used to keep data confidential.

(Pick 2)

Accounting

Authorization

Authentication

Encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?