
Cybersecurity: CIA. threats and vulnerabilities
Authored by David Heseltine
Computers
12th Grade
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT considered a type of confidential company information?
Salaries
Trade secrets
Public customer reviews
Medical information
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does CIA stand for in the context of cybersecurity?
Central Intelligence Agency
Confidentiality, Integrity, Availability
Cybersecurity and Information Assurance
Computer Intelligence Assessment
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a consequence of not maintaining confidentiality, integrity, and availability (CIA)?
Increased customer trust
Regulatory fines
Improved brand image
Stronger security posture
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the importance of maintaining CIA in an organization?
To maximize profits
To promote negative brand image
To avoid security risks
To build trust with stakeholders
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a technical threat to cybersecurity?
Human error
Natural disasters
Denial-of-service (DoS) attack
Social engineering
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware encrypts a victim's files and demands a ransom for decryption?
Spyware
Ransomware
Worm
Trojan
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which non-technical threat involves manipulating individuals into revealing sensitive information?
Botnet
SQL injection
Social engineering
Buffer overflow
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?