POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

7th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Unit 3 LO1 recap

Unit 3 LO1 recap

12th Grade

10 Qs

Quiz Pengetahuan 2

Quiz Pengetahuan 2

11th Grade

15 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

FSIS CA #3 Test Review

FSIS CA #3 Test Review

8th Grade

14 Qs

C5- Managing computing securely, safely and ethically

C5- Managing computing securely, safely and ethically

11th Grade

10 Qs

CYB: UNIT 1, LESSON 6 QUIZ

CYB: UNIT 1, LESSON 6 QUIZ

9th - 12th Grade

12 Qs

Network Fundamentals-Introduction to Networks Part 2

Network Fundamentals-Introduction to Networks Part 2

9th Grade - University

9 Qs

UH-VPN

UH-VPN

12th Grade

15 Qs

POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

Assessment

Quiz

Computers

7th - 12th Grade

Medium

Created by

Renee Bajor

Used 12+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having multiple levels of protection.

remote access Trojan (RAT)

defense in depth

threat

CIA triad

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The condition of being private or secret.

confidentiality

firmware

logic bomb

backdoor

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All points or areas in a system that could be used or compromised to allow hackers entry into the system.

rootkit

dumpster diving

cryptomalware

attack surface

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The three underlying principles of data protection: confidentiality, integrity, and availability.

rootkit

CIA Triad

pretexting

dumpster diving

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Help break down the aspects of a business and security domains into manageable task areas and tasks to organize protection against cybersecurity threats.

confidentiality

attack surface

integrity

frameworks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The state of data being complete or uncorrupted; also the honesty of a person's actions.

nonrepudiation process

integrity

Internet of Things (IoT)

defense in depth

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computing technology incorporated into nontypical devices to allow communication with other devices and the internet.

CIA Triad

frameworks

Internet of Things (IoT)

attack surface

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?