Security Fundamentals Review 1

Security Fundamentals Review 1

11th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Fund:  Unit 1 Review

Cybersecurity Fund: Unit 1 Review

9th - 12th Grade

15 Qs

Unit 1 Quiz Prep

Unit 1 Quiz Prep

9th - 12th Grade

13 Qs

Unit 1 Quiz - What is Cybersecurity?

Unit 1 Quiz - What is Cybersecurity?

9th - 12th Grade

15 Qs

Cybersecurity Fundamentals Week 2 Quiz

Cybersecurity Fundamentals Week 2 Quiz

KG - University

10 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Midterm Review 4

Midterm Review 4

11th Grade

15 Qs

computer security

computer security

KG - 12th Grade

12 Qs

Security Fundamentals Review 1

Security Fundamentals Review 1

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Yarice Hidalgo

Used 7+ times

FREE Resource

10 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What is Cybersecurity?

Evaluate responses using AI:

OFF

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Mark all the choices that describe Cybersecurity.

Has emerged as one of the most critical areas that businesses and other organizations must address in their day-to-day operations.

Is one of the best paid careers in today's market.

Is the Fastest Growing Tech Sector Worldwide . 

All of the Above

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The ________ is a paradigm for guiding information security policy inside an organization.

4.

MATCH QUESTION

1 min • 1 pt

Match the following

security method in which a system's default configuration is changed to protect it against assaults.

Confidentiality

it refers to the consistency, correctness, and reliability of data throughout its lifespan.

Availability

refers to the capacity for authorized parties to access information consistently.

Hardening

safeguards are in place to protect sensitive data from unwanted access.

Integrity

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A__________ occurs when the confidentiality of secret or private information is breached, whether via international or unintentional means.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select the terminology that represent data breach methods.

Snooping

Wiretapping

Social Engineering

Eavesdropping

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE OR FALSE? Integrity is jeopardized anytime someone has access to sensitive material without permission or when it is unintentionally changed in any way.

TRUE

FALSE

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?