Unit 3 Vocabulary

Unit 3 Vocabulary

University

30 Qs

quiz-placeholder

Similar activities

Greek Philosophers

Greek Philosophers

2nd Grade - University

25 Qs

Yaraci English Diagnostic Test (Academic English)

Yaraci English Diagnostic Test (Academic English)

12th Grade - University

27 Qs

Rhetorical Vocabulary

Rhetorical Vocabulary

11th Grade - University

25 Qs

Tutorial of Photo and Video Editing

Tutorial of Photo and Video Editing

11th Grade - University

30 Qs

Once Upon a Time

Once Upon a Time

9th Grade - University

25 Qs

KNOW YOUR RIGHTS

KNOW YOUR RIGHTS

3rd Grade - University

26 Qs

Unit 3 Vocabulary

Unit 3 Vocabulary

Assessment

Quiz

English

University

Medium

CCSS
RI.9-10.4, L.3.2E, L.11-12.6

+18

Standards-aligned

Created by

Alex Harris

Used 4+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The company’s ___________ of the security breach was limited, which led to a delay in addressing it.

Awareness

Discrimination

Neuroscience

Secure

Tags

CCSS.L.2.4B

CCSS.L.2.4C

CCSS.L.3.2E

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The IT department gave careful ________________ to the new internet security proposal before implementing it.

Consideration

Ethical

Objective

Variants

Tags

CCSS.L.2.4B

CCSS.L.2.4C

CCSS.L.3.2E

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The company was accused of _____________ against employees based on their internet usage and online activities.

Discrimination

Investigative

Journalistic

Secure

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The study examined the _______________ between different systems in the internet security ecosystem.

Interactions

Scenario

Specific

Violated

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The company’s decision to use weak encryption was not __________ and was met with public backlash.

Ethical

Decoding

Generate

Inherently

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The cybersecurity analyst conducted an _____________ audit on the company’s internet security practices.

Investigative

Objective

Recreate

Sequence

Tags

CCSS.L.2.4B

CCSS.L.2.4C

CCSS.L.3.2E

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The article was written by a________________ expert who had years of experience in the field.

Journalistic

Occurring

Significant

Obviously

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?