Security Fundamentals Review 1

Security Fundamentals Review 1

11th Grade

10 Qs

quiz-placeholder

Similar activities

VB Controls

VB Controls

11th Grade

10 Qs

AIJ XI TKJ

AIJ XI TKJ

11th Grade

10 Qs

Ms. Exel dan Fungsi Logika IF

Ms. Exel dan Fungsi Logika IF

10th Grade - University

15 Qs

EmTech Q1 Post Test 3

EmTech Q1 Post Test 3

11th Grade

10 Qs

Computer Lab Rules

Computer Lab Rules

9th - 12th Grade

13 Qs

Input Devices of Computer

Input Devices of Computer

11th Grade

10 Qs

Class XI Basics

Class XI Basics

11th - 12th Grade

15 Qs

Data Type- XI

Data Type- XI

11th Grade

10 Qs

Security Fundamentals Review 1

Security Fundamentals Review 1

Assessment

Quiz

Computers

11th Grade

Practice Problem

Hard

Created by

Yarice Hidalgo

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What is Cybersecurity?

Evaluate responses using AI:

OFF

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Mark all the choices that describe Cybersecurity.

Has emerged as one of the most critical areas that businesses and other organizations must address in their day-to-day operations.

Is one of the best paid careers in today's market.

Is the Fastest Growing Tech Sector Worldwide . 

All of the Above

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The ________ is a paradigm for guiding information security policy inside an organization.

4.

MATCH QUESTION

1 min • 1 pt

Match the following

it refers to the consistency, correctness, and reliability of data throughout its lifespan.

Hardening

security method in which a system's default configuration is changed to protect it against assaults.

Integrity

refers to the capacity for authorized parties to access information consistently.

Availability

safeguards are in place to protect sensitive data from unwanted access.

Confidentiality

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A__________ occurs when the confidentiality of secret or private information is breached, whether via international or unintentional means.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select the terminology that represent data breach methods.

Snooping

Wiretapping

Social Engineering

Eavesdropping

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE OR FALSE? Integrity is jeopardized anytime someone has access to sensitive material without permission or when it is unintentionally changed in any way.

TRUE

FALSE

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?