
Unit 4 - Principles of Cybersecurity
Authored by Timothy Eleinko
others
9th - 12th Grade
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Noah, Samuel, and Arjun are working on a project to secure their school's computer system. They are focusing on a principle known as the CIA Triad in Cybersecurity. What does this refer to?
Confidentiality, Integrity, and Availability
Central Intelligence Agency
Computer Integration Algorithms
Confidential Information Availability
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Aiden sends an email to Benjamin and Aria. They want to be sure that the email is indeed from Aiden. This assurance is known as what?
Data Integrity
Data Availability
Source Availability
Source Integrity
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
In a school project, Benjamin, Harper, and Oliver are working on a database. They need to ensure that the data they input is accessible by their teacher when needed. This concept is known as what?
Integrity
Availability
Confidentiality
Security
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Arjun, Nora, and Aiden are working on a Cybersecurity project. They are discussing the acronym PPT. According to them, what does PPT refer to in the context of Cybersecurity?
People, Programming, and Teaching
People, Processes, and Technology
Programming, Processing, and Thinking
Protecting, Providing, and Teaching
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Isla is the network administrator at a large corporation. She is tasked with controlling which employees, like Samuel and Avery, have access to the company's networks and determining what level of access each employee has. This is an example of what?
Confidentiality
Availability
Integrity
Encryption
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Noah, Olivia, and William are discussing about Cyber Hygiene. They agreed on all points except one. Which one did they not agree on?
Locking their computers when in public areas
Encrypting their hard drives at regular intervals
Shielding their keyboards when they type passwords
Not letting strangers use their computers
Keeping sensitive information in secure places
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Mason is considering using an offsite data storage/backup for his project data. Is this an example of "Confidentiality"?
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?