POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

7th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Sept 18th  Pre-SLO Assessment

Sept 18th Pre-SLO Assessment

12th Grade

15 Qs

Their Security Quiz

Their Security Quiz

12th Grade

11 Qs

Database Security

Database Security

9th Grade

10 Qs

Day 1-Cybersecurity

Day 1-Cybersecurity

6th - 8th Grade

8 Qs

Unit 1 - 1.2.1 - CIA Triad & AAA

Unit 1 - 1.2.1 - CIA Triad & AAA

10th Grade

8 Qs

Understanding the CIA Triad in Cyber Security

Understanding the CIA Triad in Cyber Security

7th Grade

15 Qs

POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

Assessment

Quiz

Computers

7th - 12th Grade

Medium

Created by

Renee Bajor

Used 12+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having multiple levels of protection.

remote access Trojan (RAT)

defense in depth

threat

CIA triad

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The condition of being private or secret.

confidentiality

firmware

logic bomb

backdoor

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All points or areas in a system that could be used or compromised to allow hackers entry into the system.

rootkit

dumpster diving

cryptomalware

attack surface

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The three underlying principles of data protection: confidentiality, integrity, and availability.

rootkit

CIA Triad

pretexting

dumpster diving

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Help break down the aspects of a business and security domains into manageable task areas and tasks to organize protection against cybersecurity threats.

confidentiality

attack surface

integrity

frameworks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The state of data being complete or uncorrupted; also the honesty of a person's actions.

nonrepudiation process

integrity

Internet of Things (IoT)

defense in depth

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computing technology incorporated into nontypical devices to allow communication with other devices and the internet.

CIA Triad

frameworks

Internet of Things (IoT)

attack surface

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?