Chapter 2:The Cybersecurity Cube

Chapter 2: The Cybersecurity Cube

Professional Development

12 Qs

quiz-placeholder

Similar activities

Telco Practice Test 1

Telco Practice Test 1

Professional Development

15 Qs

Cyber Resilience Training

Cyber Resilience Training

Professional Development

16 Qs

PreTrainingClassesObjectsMethods

PreTrainingClassesObjectsMethods

Professional Development

10 Qs

NAT

NAT

11th Grade - Professional Development

17 Qs

2. Day 1_ITBA 10 Soal

2. Day 1_ITBA 10 Soal

KG - Professional Development

10 Qs

DECI - Week 9 - round

DECI - Week 9 - round

Professional Development

12 Qs

Microsoft 365

Microsoft 365

Professional Development

10 Qs

Cloud Computing

Cloud Computing

Professional Development

10 Qs

Chapter 2:The Cybersecurity Cube

Chapter 2: The Cybersecurity Cube

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

teacher bash

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

Which of the following are foundational principles of the cybersecurity domain? (Select 3)

confidentiality

authorization

integrity

availability

Answer explanation

Refer to curriculum topic: 2.1.1
Three foundational security principles are confidentiality, integrity and availability. 

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What name is given to a storage device connected to a network?

DAS

NAS

SAN

RAID

Answer explanation

Refer to Chapter 2 - Slides 15 - Data at Rest
A network attached storage (NAS) device is a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users. NAS devices are flexible and scalable, meaning administrators can increase the capacity as needed.

3.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

What are the three states of data? (Choose three)

at rest

encrypted

in-process

in-transit

Answer explanation

Refer to curriculum topic: 2.3.1
The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest. 

4.

FILL IN THE BLANK QUESTION

1 min • 10 pts

What is a method of sending information from one device to another using removable media?

Answer explanation

Refer to Chapter 2 - Slides 16 - Data In Transit
Sneaker net – uses removable media to physically move data from one computer to another

5.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

Which two methods help to ensure data integrity? (Choose two.)

hashing

repudiation

availability

data consistency checks

Answer explanation

Refer to Chapter 2 - Slides 11 - Integrity
Methods used to ensure data integrity include hashing, data validation checks, data consistency checks, and access controls. 

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which security service determines which resources a user can access along with the operations that a user can perform?

accounting

authentication

authorization

biometric

Answer explanation

Refer to Chapter 2 - Slides 8 - Confidentiality
Authorization services determine which resources users can access, along with the operations that users can perform. Authorization can also control when a user has access to a specific resource. 

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which security service verifies the identity of a user to prevent unauthorized access?

accounting

authentication

authorization

biometric

Answer explanation

Refer to Chapter 2 - Slides 8 - Confidentiality
Authentication verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or I.D

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?