POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

7th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

Database Security

Database Security

9th Grade

10 Qs

AP CSP Fault Tolerance

AP CSP Fault Tolerance

10th Grade

10 Qs

PEC's

PEC's

9th - 10th Grade

15 Qs

PPE & Tools

PPE & Tools

11th - 12th Grade

10 Qs

CYBERSECURITY FUNDAMENTALS (CHAPTER 1)

CYBERSECURITY FUNDAMENTALS (CHAPTER 1)

6th - 8th Grade

15 Qs

Seguridad informática

Seguridad informática

12th Grade

12 Qs

Phần mềm độc hại

Phần mềm độc hại

10th Grade

10 Qs

Security

Security

9th - 12th Grade

11 Qs

POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

Assessment

Quiz

Computers

7th - 12th Grade

Medium

Created by

Renee Bajor

Used 12+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having multiple levels of protection.

remote access Trojan (RAT)

defense in depth

threat

CIA triad

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The condition of being private or secret.

confidentiality

firmware

logic bomb

backdoor

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

All points or areas in a system that could be used or compromised to allow hackers entry into the system.

rootkit

dumpster diving

cryptomalware

attack surface

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The three underlying principles of data protection: confidentiality, integrity, and availability.

rootkit

CIA Triad

pretexting

dumpster diving

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Help break down the aspects of a business and security domains into manageable task areas and tasks to organize protection against cybersecurity threats.

confidentiality

attack surface

integrity

frameworks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The state of data being complete or uncorrupted; also the honesty of a person's actions.

nonrepudiation process

integrity

Internet of Things (IoT)

defense in depth

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computing technology incorporated into nontypical devices to allow communication with other devices and the internet.

CIA Triad

frameworks

Internet of Things (IoT)

attack surface

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?