Search Header Logo

Pillars of Cybersecurity

Authored by Joy Schwartz

Computers

Professional Development

Used 4+ times

Pillars of Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Both of these are examples of comprising _____________:

1) Unauthorized manipulation of e-commerce transaction logs and 2) unauthorized manipulation of administrator access logs on any computer.

Confidentiality

Integrity

Availability

Non-repudiation

Authentication

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

This is an example of compromising ______________:

In 2010, the Stuxnet computer worm was used to infiltrate the computer systems controlling Iran's nuclear enrichment centrifuges. The Stuxnet code modified the programmable logic controller (PLC) software, causing the centrifuges to spin out of control, while giving the console operators only normal indications.

Confidentiality

Integrity

Availability

Non-repudiation

Authentication

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

This is an example of compromising __________________:

In 2011, a company called RSA, which provides security services, acknowledged its proprietary authentication system, which is employed by some defense contractors and other high-security industries, was compromised. As a result, the attackers were also able to log into systems at Lockheed Martin, and other companies, using the stolen credentials of legitimate users.

Confidentiality

Integrity

Availability

Non-repudiation

Authentication

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

This is an example of compromising _________________:

In 2008, computer systems supporting banks, media, communications, transportation, and other infrastructure in the nation of Georgia experienced a widespread denial-of-service attack originating from Russia. At the time, a dispute had flared up between Georgia and Russia over control of areas along the Georgia-Russia border.

Confidentiality

Integrity

Availability

Non-repudiation

Authentication

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

This is an example of compromising ______________:

In December 2013, national retailer, Target, reported the theft of records for 40 million credit and debit cards used at its stores. Not long after the breach, the card data was being sold in underground forums to thieves.

Confidentiality

Integrity

Availability

Non-repudiation

Authentication

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?