MTA: 988-367 Lesson 1 Knowledge Assessment

MTA: 988-367 Lesson 1 Knowledge Assessment

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

PLTW Cybersecurity

PLTW Cybersecurity

11th - 12th Grade

20 Qs

Introduction to Cybersecurity

Introduction to Cybersecurity

11th - 12th Grade

20 Qs

As/A Level  CS 9Chpt_6: Security, Privacy, and Integrity of Data

As/A Level CS 9Chpt_6: Security, Privacy, and Integrity of Data

11th Grade

15 Qs

TeachCyber Unit 2 Review - Risk, Adversity, and Trust

TeachCyber Unit 2 Review - Risk, Adversity, and Trust

9th - 12th Grade

16 Qs

Testout Security Pro

Testout Security Pro

9th - 12th Grade

16 Qs

Data Security & Data Integrity

Data Security & Data Integrity

10th - 11th Grade

21 Qs

Security Domain

Security Domain

9th - 12th Grade

20 Qs

Cybersecurity Test

Cybersecurity Test

11th - 12th Grade

20 Qs

MTA: 988-367 Lesson 1 Knowledge Assessment

MTA: 988-367 Lesson 1 Knowledge Assessment

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Quintasia Hurt

Used 28+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are valid risk responses? (Choose all that apply.)

Mitigation

Transfer

Investment

Avoidance

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

1. Which of the following are considered removable devices or drives? (Choose all that apply.)

iPod

Netbook

USB flash drive

Burnable DVD drive

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following would be considered appropriate security measures for a building’s external security perimeter? (Choose all that apply.)

Motion detector

Parking lot lights

Turnstile

Guard patrols

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When traveling on business and headed out to dinner with a client, which of the following should be done to secure a laptop? (Choose the best answer.)

Lock it in the car trunk

Store it out of sight in a dresser drawer

Secure it a piece of furniture with a laptop security cable

Check it at the Front Desk

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to the process of eliminating a risk by choosing to not engage in an action or activity?

mitigation

residual risk

avoidance

acceptance

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

1. Which of the following technologies could be used to help ensure the confidentiality of proprietary manufacturing techniques for an auto parts manufacturing business? (Choose all that apply.)

Strong encryption

guard patrols

a laptop safe

strong authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The information security acronym CIA stands for which of the following?

Confidentiality, Identity, Access Control

Confidentiality, Integrity, Access Control

Confidentiality, Integrity, Availability

Control, Identity, Access Control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?