Security Fundamentals Review 1

Security Fundamentals Review 1

11th Grade

10 Qs

quiz-placeholder

Similar activities

Online services

Online services

7th - 12th Grade

13 Qs

Taster Day Quiz

Taster Day Quiz

11th - 12th Grade

10 Qs

Computer System - Data Capturing & Storage

Computer System - Data Capturing & Storage

11th Grade

10 Qs

POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

7th - 12th Grade

10 Qs

Cambridge Technicals Unit 3 Cybersecurity

Cambridge Technicals Unit 3 Cybersecurity

11th - 12th Grade

10 Qs

Windows Updates

Windows Updates

9th Grade - Professional Development

8 Qs

MASS STORAGE QUESTIONS

MASS STORAGE QUESTIONS

9th Grade - Professional Development

15 Qs

As/A Level  CS 9Chpt_6: Security, Privacy, and Integrity of Data

As/A Level CS 9Chpt_6: Security, Privacy, and Integrity of Data

11th Grade

15 Qs

Security Fundamentals Review 1

Security Fundamentals Review 1

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Yarice Hidalgo

Used 7+ times

FREE Resource

10 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

What is Cybersecurity?

Evaluate responses using AI:

OFF

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Mark all the choices that describe Cybersecurity.

Has emerged as one of the most critical areas that businesses and other organizations must address in their day-to-day operations.

Is one of the best paid careers in today's market.

Is the Fastest Growing Tech Sector Worldwide . 

All of the Above

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The ________ is a paradigm for guiding information security policy inside an organization.

4.

MATCH QUESTION

1 min • 1 pt

Match the following

refers to the capacity for authorized parties to access information consistently.

Confidentiality

safeguards are in place to protect sensitive data from unwanted access.

Availability

it refers to the consistency, correctness, and reliability of data throughout its lifespan.

Hardening

security method in which a system's default configuration is changed to protect it against assaults.

Integrity

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A__________ occurs when the confidentiality of secret or private information is breached, whether via international or unintentional means.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Select the terminology that represent data breach methods.

Snooping

Wiretapping

Social Engineering

Eavesdropping

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

TRUE OR FALSE? Integrity is jeopardized anytime someone has access to sensitive material without permission or when it is unintentionally changed in any way.

TRUE

FALSE

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?