
TeachCyber Unit 2 Review - Risk, Adversity, and Trust
Authored by Diane Glasgow
Computers
9th - 12th Grade
Used 47+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which statement describes the purpose of a data classification system for cybersecurity?
To select the controls needed for protection of confidentiality to “top secret” information
To meet the legal requirement for access control to Personally Identifiable Information (PII)
To identify the risks to system security and to determine the probability of occurrence
To identify information assets and protect from a loss of confidentiality, integrity and availability
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Inappropriate file access to, or disclosure of, protectively marked information, whether by an adversary or accidentally, is a loss of:
Availability
Confidentiality
Integrity
Availability and Confidentiality
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
User error resulting in the unauthorized access to, modification of, and disclosure confidential information assets represents a loss of:
Confidentiality
Confidentiality and Integrity
Availability and Integrity
Availability
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which term refers to a circumstance or event with the potential to have an adverse effect on organizational operations?
Threat
Vulnerability
Attack
Exploit
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?
Threat
Vulnerability
Attack
Exploit
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which term refers to an attempt that exploits a weakness and compromises system integrity, availability, or confidentiality?
Threat
Vulnerability
Attack
Exploit
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Fire, flood, or an adverse weather event potentially impacting the security of information assets is known as a:
Threat
Bug
Attack
Exploit
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?