
GenCyber Cybersecurity Concepts
Authored by RPSEC RPSEC
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Your home computer is secured by locks on the door, an alarm system, and a firewall.
Confidentiality
Defense In Depth
Keep it Simple
Availability
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
At a hospital, medical information about a patient is protected and only provided to authorized personnel.
Availability
Defense in Depth
Confidentiality
Integrity
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Student grades are accurate and have not been modified by an unauthorized user.
Integrity
Keep it Simple
Think Like an Adversary
Confidentiality
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A banking system is appropriately accessible by both customers and banking employees.
Think Like an Adversary
Integrity
Confidentiality
Availability
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In order to protect student data, it is useful to think of potential adversaries, such as a student wishing to change their own grades.
Think Like an Adversary
Keep it Simple
Confidentiality
Defense in Depth
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A complex computer system has many points of access and may be difficult to secure.
Think Like an Adversary
Availability
Keep it Simple
Integrity
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?