Search Header Logo

Intro to Cybersecurity

Authored by Stephanie Allen

Other

University

Used 38+ times

Intro to Cybersecurity
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Aarav is working on a project to secure his company's information system. He needs to ensure the CIA triad principles are followed. What does the C in CIA stand for?

Consistency

Confidentiality

Content

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cybersecurity class, Freya learns about the CIA triad. What does the I in CIA stand for?

Integrity

Intuition

Instance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Arthur is working on a project to improve the security of his company's information system. He is focusing on the CIA triad. What does the A in CIA stand for?

Accessibility

Availability

Authorization

Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

James, Florence, and Poppy are working on a cybersecurity project. They are discussing which state of data is the easiest to protect. Can you help them?

Data at rest, like the files stored on their computers

Data in transit, like emails they are sending to each other

Data in process, like the data being used by their software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Amelia, Henry, and Max are working on a cybersecurity project. They are discussing which state of data is the hardest to protect. Amelia thinks it's data at rest, Henry believes it's data in transit, but Max argues that it's data in process. According to Max, which state of data is the hardest to protect?

Data at rest

Data in transit

Data in process

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ava is sending a confidential document to James over the internet. Which technology should she use to ensure the document's confidentiality?

Encryption

Hashing

Access Control

Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Isabelle, Rosie, and Noah are working on a project to secure their school's computer network. They decide to use the McCumber Cube model. What are the cybersecurity countermeasures in the McCumber Cube that they should consider?

People, processes and technologies

Authentication, authorization and accounting

Confidentiality, integrity and availability

Functionality, usability and security

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?