Cybersecurity Module 2

Cybersecurity Module 2

12th Grade

•

24 Qs

quiz-placeholder

Similar activities

RDBMS

RDBMS

10th - 12th Grade

•

20 Qs

City & Guilds Award in Business Processes

City & Guilds Award in Business Processes

12th Grade

•

20 Qs

98-366 Lesson 6 Networking Services

98-366 Lesson 6 Networking Services

10th Grade - University

•

19 Qs

ULANGAN 1 TLJ KELAS XII

ULANGAN 1 TLJ KELAS XII

KG - Professional Development

•

20 Qs

Comp Sci Found DW 10.24

Comp Sci Found DW 10.24

9th - 12th Grade

•

20 Qs

Malware and Encryption Quiz

Malware and Encryption Quiz

12th Grade

•

20 Qs

Database

Database

12th Grade - University

•

20 Qs

TestOut CompTIA ITF Databases 20 Questions

TestOut CompTIA ITF Databases 20 Questions

10th - 12th Grade

•

20 Qs

Cybersecurity Module 2

Cybersecurity Module 2

Assessment

Quiz

•

Computers

•

12th Grade

•

Practice Problem

•

Medium

Created by

Carol Deuling-Ravell

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes why information assets must be identified for cybersecurity purposes?

Because you cannot protect what you have not identified.

Because you should only protect what you have identified.

Because you can only identify some information assets.

Because you should only identify those information assets that are the most important.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

User error resulting in the access to, modification of, and disclosure of confidential information assets represents a loss of:

confidentiality

confidentiality and integrity

availability and integrity

availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Inappropriate file access to, or disclosure of, protectively marked information, whether by an adversary or accidentally, is a loss of:

availability

confidentiality

integrity

availability and confidentiality

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the purpose of a data classification system for cybersecurity?

to ensure filenames are compliant with the naming policy rules

to identify information assets and protect them from a loss of confidentiality, integrity and availability

to describe all possible vulnerabilities in the system

to initiate a threat assessment protocol

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe ensuring that authorized parties are able to access the information when it is needed?

confidentiality

integrity

availability

asset identification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a circumstance or event with the potential to have an adverse effect on organizational operations?

threat

vulnerability

attack

exploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?

threat

vulnerability

attack

exploit

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?