Intro to Cybersecurity

Quiz
•
Other
•
University
•
Medium
Stephanie Allen
Used 15+ times
FREE Resource
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Aarav is working on a project to secure his company's information system. He needs to ensure the CIA triad principles are followed. What does the C in CIA stand for?
Consistency
Confidentiality
Content
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a cybersecurity class, Freya learns about the CIA triad. What does the I in CIA stand for?
Integrity
Intuition
Instance
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Arthur is working on a project to improve the security of his company's information system. He is focusing on the CIA triad. What does the A in CIA stand for?
Accessibility
Availability
Authorization
Authentication
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James, Florence, and Poppy are working on a cybersecurity project. They are discussing which state of data is the easiest to protect. Can you help them?
Data at rest, like the files stored on their computers
Data in transit, like emails they are sending to each other
Data in process, like the data being used by their software
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Amelia, Henry, and Max are working on a cybersecurity project. They are discussing which state of data is the hardest to protect. Amelia thinks it's data at rest, Henry believes it's data in transit, but Max argues that it's data in process. According to Max, which state of data is the hardest to protect?
Data at rest
Data in transit
Data in process
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ava is sending a confidential document to James over the internet. Which technology should she use to ensure the document's confidentiality?
Encryption
Hashing
Access Control
Authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Isabelle, Rosie, and Noah are working on a project to secure their school's computer network. They decide to use the McCumber Cube model. What are the cybersecurity countermeasures in the McCumber Cube that they should consider?
People, processes and technologies
Authentication, authorization and accounting
Confidentiality, integrity and availability
Functionality, usability and security
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Cluster Point Quiz

Quiz
•
University
10 questions
System Analysis and Design

Quiz
•
University
11 questions
AI Terminology Quiz

Quiz
•
University
10 questions
Cybersecurity 101

Quiz
•
University
15 questions
230419_quizizz

Quiz
•
University
8 questions
CyberTechDay

Quiz
•
University
11 questions
Network Security

Quiz
•
University
10 questions
CYBER CONCLAVE- ROUND 2

Quiz
•
University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade