WebXam Cram 1.9.23

WebXam Cram 1.9.23

12th Grade

12 Qs

quiz-placeholder

Similar activities

Communication & Information (ITEEA 17)

Communication & Information (ITEEA 17)

12th Grade

17 Qs

New CTE School

New CTE School

KG - University

10 Qs

UHI Ch 2 Introduction to Health Insurance

UHI Ch 2 Introduction to Health Insurance

12th Grade

14 Qs

Fanuc Teach Pendant

Fanuc Teach Pendant

10th Grade - University

12 Qs

Digital Data Storage Quiz

Digital Data Storage Quiz

9th Grade - University

15 Qs

Security

Security

11th - 12th Grade

17 Qs

Nutrition, HWB (A2 - Wk23)

Nutrition, HWB (A2 - Wk23)

12th Grade

8 Qs

SISTEMA

SISTEMA

9th Grade - University

15 Qs

WebXam Cram 1.9.23

WebXam Cram 1.9.23

Assessment

Quiz

Specialty

12th Grade

Medium

Created by

Susan Grasso

Used 3+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym CIA refer to when discussing information security?
Confidentiality, Integrity, and Availability
Computers, Internet, and Applications
Central Intelligence Agency
Certified Internal Auditor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is it important to ensure the confidentiality, integrity, and availability of information?
To protect sensitive data from unauthorized access or tampering
To prevent system failures and ensure uninterrupted access to information
To comply with legal and regulatory requirements
All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of verifying the identity of a user or device attempting to access a computer system or network called?
a) Authentication
b) Authorization
c) Auditing
d) Access control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of granting or denying access to resources or services based on the identity of a user or device?
a) Authentication
b) Authorization
c) Auditing
d) Access control

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of monitoring and recording activity in a system to help identify and prevent security breaches?
a) Authentication
b) Authorization
c) Auditing
d) Access control

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is a user's identity usually verified during the authentication process?
a) By using a password
b) By using a fingerprint
c) By using a security token
d) All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a commonly used method of computer authentication?
A) Password-based authentication
B) Biometric authentication
C) Token-based authentication
D) Astrology-based authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?