Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

10 Qs

quiz-placeholder

Similar activities

No 52 GDPR and data loss

No 52 GDPR and data loss

12th Grade - University

15 Qs

The Broadband Internet Connection

The Broadband Internet Connection

9th Grade - University

11 Qs

Computer Systems - Lesson 4 - Operating Systems

Computer Systems - Lesson 4 - Operating Systems

12th Grade

13 Qs

definition for AP CSP

definition for AP CSP

10th - 12th Grade

13 Qs

KSSM_FORM 5_CHAPTER 9_SUBCHAPTER 9.2

KSSM_FORM 5_CHAPTER 9_SUBCHAPTER 9.2

1st - 12th Grade

8 Qs

Computer Systems - Lesson 7 - Fetch-Decode-Execute Cycle

Computer Systems - Lesson 7 - Fetch-Decode-Execute Cycle

12th Grade

8 Qs

Cell Phone

Cell Phone

10th Grade - University

15 Qs

GSS230_GNSS Quiz

GSS230_GNSS Quiz

12th Grade

10 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Science

12th Grade

Medium

NGSS
MS-PS4-3, MS-PS3-1

Standards-aligned

Created by

Joshua Krzemien

Used 5+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the foundational principle of the cybersecurity domain?

Confidentiality

Integrity

Availability

All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Data in transit?

The transmission of data between different locations through a private network or the Internet

The collection and manipulation of digital data to produce meaningful information

A storage device that retains data when no user or process is using it

None of the above

Tags

NGSS.MS-PS4-3

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Data in process?

The transmission of data between different locations through a private network or the Internet

The collection and manipulation of digital data to produce meaningful information

A storage device that retains data when no user or process is using it

None of the above

Tags

NGSS.MS-PS3-1

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Data at rest?

The transmission of data between different locations through a private network or the Internet

The collection and manipulation of digital data to produce meaningful information

A storage device that retains data when no user or process is using it

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Technical Controls?

Hardware and software components that protect a system against a cyberattack

Company's set of security goals and rules for user and administrator behavior

Categories of US Government data sensitivity

Factors of identification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Policy Controls?

Hardware and software components that protect a system against a cyberattack

Company's set of security goals and rules for user and administrator behavior

Categories of US Government data sensitivity

Factors of identification

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Name the four US Government data sensitivity categories.

Top Secret, Secret, Confidential, and Restricted

Something you know, Something you have, and Something you are

Firewalls, Encryption, and Intrusion Detection Systems

AUP, Remote Access Policies, and Network Maintenance Policies

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?