Cybersecurity Cube

Cybersecurity Cube

University

25 Qs

quiz-placeholder

Similar activities

RAID Storage

RAID Storage

University

20 Qs

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

System Software & System Unit

System Software & System Unit

University

21 Qs

BAB 11

BAB 11

University

20 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

202309 BMIT27x3 Revision Quiz 2

202309 BMIT27x3 Revision Quiz 2

University

20 Qs

Mobile Data Management Quiz

Mobile Data Management Quiz

University

20 Qs

CIA Triad Quiz

CIA Triad Quiz

University

20 Qs

Cybersecurity Cube

Cybersecurity Cube

Assessment

Quiz

Computers

University

Medium

Created by

HOMER SANTOS

Used 9+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A company wants to ensure that critical systems and data are always accessible, even in the event of a hardware failure or natural disaster. Which principle of security does this scenario primarily address?

Confidentiality

Availability

Integrity

None of these

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the main purpose of authorization in a computer system?

To validate user identities

To encrypt data during transmission

To control access to resources

To ensure data integrity

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The cybersecurity incident response plan of a company is not up-to-date. Which principles of security is most likely to be violated?

Confidentiality

Availability

Integrity

None of these

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A user attempts to access a highly sensitive file stored on a secure server. In addition to providing a username and password, the user is also prompted to provide a one-time password generated by an authentication app. What security measure is being implemented in this scenario?

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are methods that ensure confidentiality?  

Select two answers.

Encryption

Hardware Repairs

Hashing

Authentication

Checksum

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which state of data is primarily associated with data breaches occurring due to unauthorized access to stored information?

Data at Rest

Data in Process

Data in Transit

None of these

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A video editing company requires extremely high performance for simultaneous editing of large video files. Which RAID level should they consider?

RAID 0

RAID 1

RAID 5

RAID 10

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?