Cybersecurity: CIA. threats and vulnerabilities

Cybersecurity: CIA. threats and vulnerabilities

12th Grade

25 Qs

quiz-placeholder

Similar activities

Cybersecurity Vocabulary

Cybersecurity Vocabulary

11th - 12th Grade

20 Qs

2.1.1 & 2.1.2 Cyber CIA and Passive Analysis

2.1.1 & 2.1.2 Cyber CIA and Passive Analysis

10th - 12th Grade

24 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Cybersecurity Codehs

Cybersecurity Codehs

11th - 12th Grade

20 Qs

CYBERSECURITY EXAM

CYBERSECURITY EXAM

9th - 12th Grade

20 Qs

CIA Triad Summer School Exam 2

CIA Triad Summer School Exam 2

9th - 12th Grade

20 Qs

Cybersecurity Review

Cybersecurity Review

7th - 12th Grade

20 Qs

Cybersecurity Test

Cybersecurity Test

11th - 12th Grade

20 Qs

Cybersecurity: CIA. threats and vulnerabilities

Cybersecurity: CIA. threats and vulnerabilities

Assessment

Quiz

Computers

12th Grade

Medium

Created by

David Heseltine

Used 7+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT considered a type of confidential company information?

Salaries

Trade secrets

Public customer reviews

Medical information

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does CIA stand for in the context of cybersecurity?

Central Intelligence Agency

Confidentiality, Integrity, Availability

Cybersecurity and Information Assurance

Computer Intelligence Assessment

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a consequence of not maintaining confidentiality, integrity, and availability (CIA)?

Increased customer trust

Regulatory fines

Improved brand image

Stronger security posture

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the importance of maintaining CIA in an organization?

To maximize profits

To promote negative brand image

To avoid security risks

To build trust with stakeholders

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a technical threat to cybersecurity?

Human error

Natural disasters

Denial-of-service (DoS) attack

Social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware encrypts a victim's files and demands a ransom for decryption?

Spyware

Ransomware

Worm

Trojan

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which non-technical threat involves manipulating individuals into revealing sensitive information?

Botnet

SQL injection

Social engineering

Buffer overflow

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?