Pillars of Cybersecurity

Pillars of Cybersecurity

Professional Development

5 Qs

quiz-placeholder

Similar activities

CNS QUIZ

CNS QUIZ

Professional Development

10 Qs

ICA TRIAD

ICA TRIAD

Professional Development

10 Qs

Network Security - Module 15

Network Security - Module 15

Professional Development

9 Qs

Cybersecurity - CIA triad

Cybersecurity - CIA triad

Professional Development

10 Qs

GenCyber Cybersecurity Concepts

GenCyber Cybersecurity Concepts

Professional Development

6 Qs

Security Pro Section 7 quiz 2

Security Pro Section 7 quiz 2

Professional Development

10 Qs

CNS Introduction -II

CNS Introduction -II

Professional Development

8 Qs

Pre-Test 14 Agustus 2023

Pre-Test 14 Agustus 2023

Professional Development

10 Qs

Pillars of Cybersecurity

Pillars of Cybersecurity

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Joy Schwartz

Used 4+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Both of these are examples of comprising _____________:

1) Unauthorized manipulation of e-commerce transaction logs and 2) unauthorized manipulation of administrator access logs on any computer.

Confidentiality

Integrity

Availability

Non-repudiation

Authentication

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

This is an example of compromising ______________:

In 2010, the Stuxnet computer worm was used to infiltrate the computer systems controlling Iran's nuclear enrichment centrifuges. The Stuxnet code modified the programmable logic controller (PLC) software, causing the centrifuges to spin out of control, while giving the console operators only normal indications.

Confidentiality

Integrity

Availability

Non-repudiation

Authentication

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

This is an example of compromising __________________:

In 2011, a company called RSA, which provides security services, acknowledged its proprietary authentication system, which is employed by some defense contractors and other high-security industries, was compromised. As a result, the attackers were also able to log into systems at Lockheed Martin, and other companies, using the stolen credentials of legitimate users.

Confidentiality

Integrity

Availability

Non-repudiation

Authentication

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

This is an example of compromising _________________:

In 2008, computer systems supporting banks, media, communications, transportation, and other infrastructure in the nation of Georgia experienced a widespread denial-of-service attack originating from Russia. At the time, a dispute had flared up between Georgia and Russia over control of areas along the Georgia-Russia border.

Confidentiality

Integrity

Availability

Non-repudiation

Authentication

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

This is an example of compromising ______________:

In December 2013, national retailer, Target, reported the theft of records for 40 million credit and debit cards used at its stores. Not long after the breach, the card data was being sold in underground forums to thieves.

Confidentiality

Integrity

Availability

Non-repudiation

Authentication