Day 1 Review

Day 1 Review

12th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals Quiz

Cybersecurity Fundamentals Quiz

10th Grade - University

15 Qs

Unit 1 Quiz - What is Cybersecurity?

Unit 1 Quiz - What is Cybersecurity?

9th - 12th Grade

15 Qs

CYB: UNIT 1, LESSON 6 QUIZ

CYB: UNIT 1, LESSON 6 QUIZ

9th - 12th Grade

12 Qs

Cybersecurity

Cybersecurity

7th - 12th Grade

10 Qs

A+ 1002 Chapter 4 Review

A+ 1002 Chapter 4 Review

7th - 12th Grade

15 Qs

CIA Triad

CIA Triad

12th Grade

9 Qs

Information Security

Information Security

9th - 12th Grade

8 Qs

Unit 1 Quiz Prep

Unit 1 Quiz Prep

9th - 12th Grade

13 Qs

Day 1 Review

Day 1 Review

Assessment

Quiz

Computers

12th Grade

Easy

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes Man-in-the-Middle attack?

When a computer is put between a sender and receiver

When a computer is put between a sender and receiver

When a person looks through files

When a person hardens an operating system

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call a person who hacks a system using an existing script downloaded from the internet?

Script kiddy

White hat

Black hat

Hacktivist

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security term refers to a person, property, or data of value to a company?

Risk

Asset

Threat

Vulnerability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the Integrity component of the CIA triad?

To create a process for accessing data

To determine whether data is relevant

To ensure that only authorized parties can modify data

To ensure that only authorized parties can view data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack that encrypt files and demand payment is known as?

Backdoor Attack

Privileged escalation

Scareware

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the security principle used for information security development ?

CAI Triad

CIA Triad

IAAA Triad

AAA Triad

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Alice sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails?

Non-repudiation

Authenticity

Confidentiality

Integrity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?