Chapter 2:The Cybersecurity Cube

Chapter 2: The Cybersecurity Cube

Professional Development

12 Qs

quiz-placeholder

Similar activities

AWS Practitioner - 10

AWS Practitioner - 10

Professional Development

10 Qs

Network Plus Pre Assessment

Network Plus Pre Assessment

Professional Development

15 Qs

Cycle 4: Session 8 Review.

Cycle 4: Session 8 Review.

Professional Development

12 Qs

Jarkom

Jarkom

1st Grade - Professional Development

11 Qs

M365 Security Pillar 1 (Identity & Access Management)

M365 Security Pillar 1 (Identity & Access Management)

Professional Development

10 Qs

Quiz - DevSecOps

Quiz - DevSecOps

Professional Development

10 Qs

Cloud computing

Cloud computing

Professional Development

10 Qs

Family Quizz

Family Quizz

5th Grade - Professional Development

15 Qs

Chapter 2:The Cybersecurity Cube

Chapter 2: The Cybersecurity Cube

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

teacher bash

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

Which of the following are foundational principles of the cybersecurity domain? (Select 3)

confidentiality

authorization

integrity

availability

Answer explanation

Refer to curriculum topic: 2.1.1
Three foundational security principles are confidentiality, integrity and availability. 

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What name is given to a storage device connected to a network?

DAS

NAS

SAN

RAID

Answer explanation

Refer to Chapter 2 - Slides 15 - Data at Rest
A network attached storage (NAS) device is a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users. NAS devices are flexible and scalable, meaning administrators can increase the capacity as needed.

3.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

What are the three states of data? (Choose three)

at rest

encrypted

in-process

in-transit

Answer explanation

Refer to curriculum topic: 2.3.1
The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest. 

4.

FILL IN THE BLANK QUESTION

1 min • 10 pts

What is a method of sending information from one device to another using removable media?

Answer explanation

Refer to Chapter 2 - Slides 16 - Data In Transit
Sneaker net – uses removable media to physically move data from one computer to another

5.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

Which two methods help to ensure data integrity? (Choose two.)

hashing

repudiation

availability

data consistency checks

Answer explanation

Refer to Chapter 2 - Slides 11 - Integrity
Methods used to ensure data integrity include hashing, data validation checks, data consistency checks, and access controls. 

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which security service determines which resources a user can access along with the operations that a user can perform?

accounting

authentication

authorization

biometric

Answer explanation

Refer to Chapter 2 - Slides 8 - Confidentiality
Authorization services determine which resources users can access, along with the operations that users can perform. Authorization can also control when a user has access to a specific resource. 

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which security service verifies the identity of a user to prevent unauthorized access?

accounting

authentication

authorization

biometric

Answer explanation

Refer to Chapter 2 - Slides 8 - Confidentiality
Authentication verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or I.D

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?