Intro to Cybersecurity

Quiz
•
Other
•
University
•
Medium
Stephanie Allen
Used 15+ times
FREE Resource
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Aarav is working on a project to secure his company's information system. He needs to ensure the CIA triad principles are followed. What does the C in CIA stand for?
Consistency
Confidentiality
Content
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a cybersecurity class, Freya learns about the CIA triad. What does the I in CIA stand for?
Integrity
Intuition
Instance
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Arthur is working on a project to improve the security of his company's information system. He is focusing on the CIA triad. What does the A in CIA stand for?
Accessibility
Availability
Authorization
Authentication
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
James, Florence, and Poppy are working on a cybersecurity project. They are discussing which state of data is the easiest to protect. Can you help them?
Data at rest, like the files stored on their computers
Data in transit, like emails they are sending to each other
Data in process, like the data being used by their software
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Amelia, Henry, and Max are working on a cybersecurity project. They are discussing which state of data is the hardest to protect. Amelia thinks it's data at rest, Henry believes it's data in transit, but Max argues that it's data in process. According to Max, which state of data is the hardest to protect?
Data at rest
Data in transit
Data in process
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ava is sending a confidential document to James over the internet. Which technology should she use to ensure the document's confidentiality?
Encryption
Hashing
Access Control
Authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Isabelle, Rosie, and Noah are working on a project to secure their school's computer network. They decide to use the McCumber Cube model. What are the cybersecurity countermeasures in the McCumber Cube that they should consider?
People, processes and technologies
Authentication, authorization and accounting
Confidentiality, integrity and availability
Functionality, usability and security
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
MOVIE TRIVIA!

Quiz
•
9th Grade - University
10 questions
Cloud Computing

Quiz
•
University
10 questions
EDA - Review on Types of Data

Quiz
•
University
15 questions
Cyber Security Quiz - 1 - TI5A

Quiz
•
University
10 questions
IT Governance

Quiz
•
University
10 questions
Physical Security Quiz

Quiz
•
University
10 questions
cyber security

Quiz
•
University
10 questions
LISELEC WEEK 7

Quiz
•
University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Other
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
7 questions
Common and Proper Nouns

Interactive video
•
4th Grade - University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University
7 questions
PC: Unit 1 Quiz Review

Quiz
•
11th Grade - University
7 questions
Supporting the Main Idea –Informational

Interactive video
•
4th Grade - University
12 questions
Hurricane or Tornado

Quiz
•
3rd Grade - University
7 questions
Enzymes (Updated)

Interactive video
•
11th Grade - University