Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

quiz-placeholder

Similar activities

The AI Shield

The AI Shield

University

15 Qs

CSS 10 - QUIZ

CSS 10 - QUIZ

10th Grade

20 Qs

Accessing the Internet

Accessing the Internet

9th - 10th Grade

15 Qs

Quiz on List and Tuples

Quiz on List and Tuples

University

16 Qs

แบบทดสอบบทที่ 2 การเก็บรวบรวมและสำรวจข้อมูล ม.5

แบบทดสอบบทที่ 2 การเก็บรวบรวมและสำรวจข้อมูล ม.5

9th - 12th Grade

20 Qs

Sistem Informasi Manajemen

Sistem Informasi Manajemen

University

20 Qs

CHỦ ĐỀ A. MÁY TÍNH VÀ XÃ HỘI TRÍ THỨC P1

CHỦ ĐỀ A. MÁY TÍNH VÀ XÃ HỘI TRÍ THỨC P1

10th Grade

20 Qs

ASESMEN INFORMATIKAN BAB 1 SERI 2

ASESMEN INFORMATIKAN BAB 1 SERI 2

10th Grade

15 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

Assessment

Quiz

Computers

9th Grade - University

Medium

Created by

Paul Zettler

Used 58+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This cybersecurity goal or principle refers to the accuracy, consistency, and trustworthiness of data.

Integrity

Confidentiality

Availability

Accountability

2.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This cybersecurity goal or principle involves preventing the disclosure of information to unauthorized people, resources, or processes.

Integrity

Confidentiality

Availability

Accountability

3.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

The first dimension of the Cybersecurity Cube lists these three goals or foundation principles.

Transmission, Storage, Processing

Confidentiality, Integrity, Availability

Technology, Policies and Practice, People

Concern, Irritability, Assurances

4.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

These are the three dimensions of the Cybersecurity Cube.

Transmission, Storage, Processing

Confidentiality, Integrity, Availability

Technology, Policies and Practice, People

Security Principles, Information States, Countermeasures

5.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is the process of keeping track of what all the users do within your systems.

Accounting

Authorization

Authentication

Availability

6.

MULTIPLE CHOICE QUESTION

5 mins • 1 pt

Media Image

This is the process of deciding what resources and data a user can access along with the operations that a user is allowed to perform.

Accounting

Authorization

Authentication

Availability

7.

MULTIPLE SELECT QUESTION

5 mins • 1 pt

Media Image

These are two methods used to keep data confidential.

(Pick 2)

Accounting

Authorization

Authentication

Encryption

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers