Day 3 Quizz

Day 3 Quizz

8th Grade

7 Qs

quiz-placeholder

Similar activities

Sisters Through Code PreQuiz

Sisters Through Code PreQuiz

6th - 12th Grade

10 Qs

Review on browser cookies

Review on browser cookies

8th Grade

10 Qs

Cybersecurity, Victor Magnusson

Cybersecurity, Victor Magnusson

1st Grade - Professional Development

10 Qs

Sangfor VDI partner training - B

Sangfor VDI partner training - B

1st - 10th Grade

10 Qs

How well do you know about technology

How well do you know about technology

KG - Professional Development

11 Qs

The Internet: Cybersecurity & crime

The Internet: Cybersecurity & crime

6th - 8th Grade

5 Qs

II Module N2  - Positive Footprints, Google Sites 8 Grade

II Module N2 - Positive Footprints, Google Sites 8 Grade

8th Grade

12 Qs

Year 6 ICT - Files stored on a Computer Network

Year 6 ICT - Files stored on a Computer Network

6th - 8th Grade

12 Qs

Day 3 Quizz

Day 3 Quizz

Assessment

Quiz

Instructional Technology

8th Grade

Medium

Created by

Tyler Derickson

Used 1+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three terms that make up the cybersecurity cube?

Security Principles

Data States

Prioritize Actions

Safeguards

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the terms of the CIA triad?

Confidentiality

Centralize

Integrity

Availability

Authentication

3.

DRAG AND DROP QUESTION

1 min • 1 pt

The cybersecurity ​ (a)   should practice response protocols, test ​ (b)   systems, and be familiar with ​ (c)   for restoring ​ (d)   systems.

team
backup
procedures
critical

4.

MATCH QUESTION

1 min • 1 pt

Match the following passwords to their corresponding strength rating.

"secret"

Better

"Panda$AreGr3at!"

Best

"Panda2"

Weak

5.

MATCH QUESTION

1 min • 1 pt

Match the following terms and definitions.

keeps track of what users do, what they access, and how long they do it

Accounting

the verification of the identity of each user, to prevent unauthorized access

Authorization

determine which resources users can access, along with the operations that users can perform

Authentication

6.

DRAG AND DROP QUESTION

1 min • 1 pt

Multi-Factor ​ (a)   uses at least ​ (b)   methods of ​ (c)   . It can help ​ (d)   user's accounts from unauthorized ​ (e)   .

authentication
two
verification
protect
access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Identification?

enforces the rules established by an authorization policy

allows tech admins to track users

gives users a laptop assigned to them

uses two factors to allow access to an account

Discover more resources for Instructional Technology