TeachCyber Unit 2 Review - Risk, Adversity, and Trust

TeachCyber Unit 2 Review - Risk, Adversity, and Trust

9th - 12th Grade

16 Qs

quiz-placeholder

Similar activities

Security Domain

Security Domain

9th - 12th Grade

20 Qs

KEAMANAN JARINGAN

KEAMANAN JARINGAN

11th Grade

20 Qs

Cybersecurity Codehs

Cybersecurity Codehs

8th - 9th Grade

16 Qs

Understanding the CIA Triad in Cybersecurity

Understanding the CIA Triad in Cybersecurity

10th Grade

15 Qs

Quiz 1 - Prinsip dan Konsep keamanan informasi

Quiz 1 - Prinsip dan Konsep keamanan informasi

1st Grade - University

17 Qs

Cybersecurity Fund:  Unit 1 Review

Cybersecurity Fund: Unit 1 Review

9th - 12th Grade

15 Qs

Unit 1 Quiz Prep

Unit 1 Quiz Prep

9th - 12th Grade

13 Qs

Testout Security Pro

Testout Security Pro

9th - 12th Grade

16 Qs

TeachCyber Unit 2 Review - Risk, Adversity, and Trust

TeachCyber Unit 2 Review - Risk, Adversity, and Trust

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Diane Glasgow

Used 45+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which statement describes the purpose of a data classification system for cybersecurity?

To select the controls needed for protection of confidentiality to “top secret” information

To meet the legal requirement for access control to Personally Identifiable Information (PII)

To identify the risks to system security and to determine the probability of occurrence

To identify information assets and protect from a loss of confidentiality, integrity and availability

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Inappropriate file access to, or disclosure of, protectively marked information, whether by an adversary or accidentally, is a loss of:

Availability

Confidentiality

Integrity

Availability and Confidentiality

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

User error resulting in the unauthorized access to, modification of, and disclosure confidential information assets represents a loss of:

Confidentiality

Confidentiality and Integrity

Availability and Integrity

Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which term refers to a circumstance or event with the potential to have an adverse effect on organizational operations?

Threat

Vulnerability

Attack

Exploit

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?

Threat

Vulnerability

Attack

Exploit

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which term refers to an attempt that exploits a weakness and compromises system integrity, availability, or confidentiality?

Threat

Vulnerability

Attack

Exploit

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Fire, flood, or an adverse weather event potentially impacting the security of information assets is known as a:

Threat

Bug

Attack

Exploit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?