
cyber security
Authored by P P
Instructional Technology
Professional Development
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of a Risk?
Exposure to danger
Pathway to penetrate a system
Threat to security
Weakness
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False: One of the main targets of attackers today is the healthcare industry.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following protections ensures that only authorized parties can view the information?
Availability
Confidentiality
Accounting
Integrity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term is frequently used to describe the tasks of securing information that is in a digital format?
Information security
Cyber security
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a vulnerability?
Likelihood of virus infection
Hurricane
Software defect
Stolen passwords through a software flaw
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following laws was created as an attempt to fight corporate corruption?
Payment Card Industry Data Security Standard
California’s Database Security Breach Notification Act
The Health Insurance Portability and Accountability Act of 1996
The Sarbanes-Oxley Act of 2002
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term is used to describe individuals who want to attack computers yet they lack the knowledge of computers and networks needed to do so?
Script kiddies
Cybercriminals
Brokers
Insiders
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?