
Security concepts
Authored by Carlos Córdoba
Instructional Technology
Professional Development
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
When a person tries to discreetly steal your information by watching you input input it
Eavesdropping
Phishing
Shoulder Surfing
Spam
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Ensuring that data remains always accesible
Integrity
Encrypting
Confidentiality
Availability
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Setting barriers that prevent unidentified users from accessing resources
Authorization
Authentication
Sanitation
Segmentation
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Coaxing information out of people with manipulation
Spam
Stealthing
Snooping
Social Engineering
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Ensuring that not authorized users cannot access data
Accounting
Decryption
Cyphers
Confidentiality
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Keeping tabs on who accesses resources and when
Accounting
Availability
Authentication
Monitoring
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The principle that there must always be evidence archiving any and every action an user does
Accounting
Non-repudiation
Implicit deny
Authentication
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?