Search Header Logo

TeachCyber Unit 2 Review - Risk, Adversity, and Trust

Authored by Diane Glasgow

Computers

9th - 12th Grade

Used 47+ times

TeachCyber Unit 2 Review - Risk, Adversity, and Trust
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which statement describes the purpose of a data classification system for cybersecurity?

To select the controls needed for protection of confidentiality to “top secret” information

To meet the legal requirement for access control to Personally Identifiable Information (PII)

To identify the risks to system security and to determine the probability of occurrence

To identify information assets and protect from a loss of confidentiality, integrity and availability

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Inappropriate file access to, or disclosure of, protectively marked information, whether by an adversary or accidentally, is a loss of:

Availability

Confidentiality

Integrity

Availability and Confidentiality

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

User error resulting in the unauthorized access to, modification of, and disclosure confidential information assets represents a loss of:

Confidentiality

Confidentiality and Integrity

Availability and Integrity

Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which term refers to a circumstance or event with the potential to have an adverse effect on organizational operations?

Threat

Vulnerability

Attack

Exploit

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?

Threat

Vulnerability

Attack

Exploit

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which term refers to an attempt that exploits a weakness and compromises system integrity, availability, or confidentiality?

Threat

Vulnerability

Attack

Exploit

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Fire, flood, or an adverse weather event potentially impacting the security of information assets is known as a:

Threat

Bug

Attack

Exploit

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?