
Pillars of Cybersecurity
Quiz
•
Computers
•
Professional Development
•
Medium
Joy Schwartz
Used 4+ times
FREE Resource
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Both of these are examples of comprising _____________:
1) Unauthorized manipulation of e-commerce transaction logs and 2) unauthorized manipulation of administrator access logs on any computer.
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
This is an example of compromising ______________:
In 2010, the Stuxnet computer worm was used to infiltrate the computer systems controlling Iran's nuclear enrichment centrifuges. The Stuxnet code modified the programmable logic controller (PLC) software, causing the centrifuges to spin out of control, while giving the console operators only normal indications.
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
This is an example of compromising __________________:
In 2011, a company called RSA, which provides security services, acknowledged its proprietary authentication system, which is employed by some defense contractors and other high-security industries, was compromised. As a result, the attackers were also able to log into systems at Lockheed Martin, and other companies, using the stolen credentials of legitimate users.
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
This is an example of compromising _________________:
In 2008, computer systems supporting banks, media, communications, transportation, and other infrastructure in the nation of Georgia experienced a widespread denial-of-service attack originating from Russia. At the time, a dispute had flared up between Georgia and Russia over control of areas along the Georgia-Russia border.
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
This is an example of compromising ______________:
In December 2013, national retailer, Target, reported the theft of records for 40 million credit and debit cards used at its stores. Not long after the breach, the card data was being sold in underground forums to thieves.
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
Similar Resources on Wayground
10 questions
Pre-Test 14 Agustus 2023
Quiz
•
Professional Development
10 questions
CNS QUIZ
Quiz
•
Professional Development
10 questions
Cybersecurity Concepts
Quiz
•
Professional Development
9 questions
Network Security - Module 15
Quiz
•
Professional Development
6 questions
GenCyber Cybersecurity Concepts
Quiz
•
Professional Development
10 questions
Cybersecurity Quiz 1
Quiz
•
Professional Development
10 questions
OT Security quiz
Quiz
•
Professional Development
10 questions
Web application security
Quiz
•
Professional Development
Popular Resources on Wayground
50 questions
Trivia 7/25
Quiz
•
12th Grade
11 questions
Standard Response Protocol
Quiz
•
6th - 8th Grade
11 questions
Negative Exponents
Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions
Quiz
•
6th Grade
4 questions
Exit Ticket 7/29
Quiz
•
8th Grade
20 questions
Subject-Verb Agreement
Quiz
•
9th Grade
20 questions
One Step Equations All Operations
Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"
Quiz
•
9th Grade
