
POCS-Ch2.1 (Vocab)
Authored by Renee Bajor
Computers
7th - 12th Grade
Used 12+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Having multiple levels of protection.
remote access Trojan (RAT)
defense in depth
threat
CIA triad
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The condition of being private or secret.
confidentiality
firmware
logic bomb
backdoor
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
All points or areas in a system that could be used or compromised to allow hackers entry into the system.
rootkit
dumpster diving
cryptomalware
attack surface
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The three underlying principles of data protection: confidentiality, integrity, and availability.
rootkit
CIA Triad
pretexting
dumpster diving
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Help break down the aspects of a business and security domains into manageable task areas and tasks to organize protection against cybersecurity threats.
confidentiality
attack surface
integrity
frameworks
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The state of data being complete or uncorrupted; also the honesty of a person's actions.
nonrepudiation process
integrity
Internet of Things (IoT)
defense in depth
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Computing technology incorporated into nontypical devices to allow communication with other devices and the internet.
CIA Triad
frameworks
Internet of Things (IoT)
attack surface
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?