Cybersecurity Cube

Cybersecurity Cube

University

25 Qs

quiz-placeholder

Similar activities

Week 12 - Module 5 Unit 3 Using Access Control

Week 12 - Module 5 Unit 3 Using Access Control

University

20 Qs

Networking 2 Day 3 Review

Networking 2 Day 3 Review

University

23 Qs

Cisco LAN Security Concepts

Cisco LAN Security Concepts

University

22 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

Sepintas Tentang Buku Berwarna (DLMS/COSEM)

Sepintas Tentang Buku Berwarna (DLMS/COSEM)

KG - Professional Development

20 Qs

Topic 7 CFD1313

Topic 7 CFD1313

University

20 Qs

Sistem Terdistribusi - Kuis 2 4F

Sistem Terdistribusi - Kuis 2 4F

University

20 Qs

IAS Finals Reviewer

IAS Finals Reviewer

University

24 Qs

Cybersecurity Cube

Cybersecurity Cube

Assessment

Quiz

Computers

University

Medium

Created by

HOMER SANTOS

Used 9+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A company wants to ensure that critical systems and data are always accessible, even in the event of a hardware failure or natural disaster. Which principle of security does this scenario primarily address?

Confidentiality

Availability

Integrity

None of these

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the main purpose of authorization in a computer system?

To validate user identities

To encrypt data during transmission

To control access to resources

To ensure data integrity

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The cybersecurity incident response plan of a company is not up-to-date. Which principles of security is most likely to be violated?

Confidentiality

Availability

Integrity

None of these

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A user attempts to access a highly sensitive file stored on a secure server. In addition to providing a username and password, the user is also prompted to provide a one-time password generated by an authentication app. What security measure is being implemented in this scenario?

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are methods that ensure confidentiality?  

Select two answers.

Encryption

Hardware Repairs

Hashing

Authentication

Checksum

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which state of data is primarily associated with data breaches occurring due to unauthorized access to stored information?

Data at Rest

Data in Process

Data in Transit

None of these

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A video editing company requires extremely high performance for simultaneous editing of large video files. Which RAID level should they consider?

RAID 0

RAID 1

RAID 5

RAID 10

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?