Day 3 Quizz

Day 3 Quizz

8th Grade

7 Qs

quiz-placeholder

Similar activities

R&D Day 1+2 Review

R&D Day 1+2 Review

8th Grade

11 Qs

Tech Ed - Portfolio Building

Tech Ed - Portfolio Building

7th - 11th Grade

10 Qs

Pictoblox 8

Pictoblox 8

1st - 9th Grade

10 Qs

Database Concepts Quiz

Database Concepts Quiz

6th - 8th Grade

12 Qs

Apple for my apple apple

Apple for my apple apple

KG - Professional Development

10 Qs

Types of computer -Drop Quiz 1- Grade 8

Types of computer -Drop Quiz 1- Grade 8

8th Grade

10 Qs

Test Your Knowledge Part 2

Test Your Knowledge Part 2

1st - 12th Grade

10 Qs

Day 3 Quizz

Day 3 Quizz

Assessment

Quiz

Instructional Technology

8th Grade

Practice Problem

Medium

Created by

Tyler Derickson

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

7 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three terms that make up the cybersecurity cube?

Security Principles

Data States

Prioritize Actions

Safeguards

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the terms of the CIA triad?

Confidentiality

Centralize

Integrity

Availability

Authentication

3.

DRAG AND DROP QUESTION

1 min • 1 pt

The cybersecurity ​ (a)   should practice response protocols, test ​ (b)   systems, and be familiar with ​ (c)   for restoring ​ (d)   systems.

team
backup
procedures
critical

4.

MATCH QUESTION

1 min • 1 pt

Match the following passwords to their corresponding strength rating.

"secret"

Best

"Panda2"

Better

"Panda$AreGr3at!"

Weak

5.

MATCH QUESTION

1 min • 1 pt

Match the following terms and definitions.

the verification of the identity of each user, to prevent unauthorized access

Authorization

keeps track of what users do, what they access, and how long they do it

Authentication

determine which resources users can access, along with the operations that users can perform

Accounting

6.

DRAG AND DROP QUESTION

1 min • 1 pt

Multi-Factor ​ (a)   uses at least ​ (b)   methods of ​ (c)   . It can help ​ (d)   user's accounts from unauthorized ​ (e)   .

authentication
two
verification
protect
access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Identification?

enforces the rules established by an authorization policy

allows tech admins to track users

gives users a laptop assigned to them

uses two factors to allow access to an account

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?