CYBERSECURITY EXAM

CYBERSECURITY EXAM

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

UNIT 1.2 MEMORY

UNIT 1.2 MEMORY

10th Grade

19 Qs

PTS Informatika Kelas 9 Semester Ganjil 2021-2022

PTS Informatika Kelas 9 Semester Ganjil 2021-2022

9th Grade

20 Qs

9.1 Homework #3

9.1 Homework #3

9th Grade

20 Qs

REMEDI PAS - DESAIN DAN KOMP. GRAFIS

REMEDI PAS - DESAIN DAN KOMP. GRAFIS

12th Grade

20 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

1.1.3 Proses Penyelesaian Masalah

1.1.3 Proses Penyelesaian Masalah

11th Grade

20 Qs

Tes Sumatif Kelas X.10-X.12

Tes Sumatif Kelas X.10-X.12

10th Grade

20 Qs

Alat Proses

Alat Proses

9th Grade

20 Qs

CYBERSECURITY EXAM

CYBERSECURITY EXAM

Assessment

Quiz

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Joseph Carpenter

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Cynthia discovers that she has the ability to modify the lunch menu posted on her school’s website. She edits the website so for lunch every day, it says “Green Eggs and Ham”.

Which part of the CIA triad was broken?

All of the above

Availability

Integrity

Confidentiality

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following statements are true?
A. There has been a decrease in the number of cyber attacks in the past decade.
B. Cybersecurity is the protection of computer systems, networks, and data from digital attacks.
C. Cyber attacks in the past few years have impacted individuals, governments, and organizations.

B and C

A only

B only

A, B and C

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following most accurately describes the Internet of Things?

All of the websites that a person can currently access online

The network of devices with the ability to connect and exchange data

Malicious hackers intent on stealing confidential information like credit card numbers or email addresses

Internet service providers who make it possible to go online

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Robert is on an online auction site trying to make a bid on a new computer. As he tries to make a bid, the site crashes and he loses the auction.

Which part of the CIA triad was broken?

All of the above

Confidentiality

Integrity

Availability

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Alice is checking her grades on a school computer in the library, and she forgets to log out before she leaves. Bob gets on the computer after her, and he sees her grades for all of her classes.

Which part of the CIA triad was broken?

Confidentiality

Integrity

Availability

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is the primary goal of a ransomware attack?

Stealing information and data

Obtaining money through threats

Deactivating and destroying devices

Shutting down network access

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Sarah puts a lock on her diary so only she can read it. Her little brother breaks the lock and reads her diary.

Which part of the CIA triad was broken?

All of the above

Availability

Integrity

Confidentiality

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?