Cybersecurity

Cybersecurity

University

147 Qs

quiz-placeholder

Similar activities

Sec BCD 21-7-2023 Quiz-2

Sec BCD 21-7-2023 Quiz-2

University

149 Qs

COMSP211MTEX

COMSP211MTEX

University

148 Qs

Quiz on Basic Internet Usage

Quiz on Basic Internet Usage

University

151 Qs

ITS_DATABSE #2

ITS_DATABSE #2

University

145 Qs

fnaf fun play plz i need it @fortnite fix ur game 19$ gift card!

fnaf fun play plz i need it @fortnite fix ur game 19$ gift card!

KG - University

142 Qs

C-programming(Theory)

C-programming(Theory)

9th Grade - University

146 Qs

TKAM vs. OMAN

TKAM vs. OMAN

University

150 Qs

PM 2025-FINAL

PM 2025-FINAL

9th Grade - University

150 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

University

Hard

Created by

jessica sansaricq

FREE Resource

147 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ransomeware attack would result in a breach of possession because the owner would no longer have possession of the information.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ransomware attack

hacker attempts to steal sensitive information, typically in the form of usernames, passwords, credit card numbers, bank account information

hacker encrypts important information and offers to provide the decryption key for a fee.

hacker manipulate individuals and gain unauthorized access to a system by pretending to be someone they are not.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Because the data is encrypted, neither the former employee nor anyone else can read it without the proper decryption methods; therefore, there is no

breach of integrity

breach of possession

breach of confidentiality

breach of information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Breach of possession the employee removed the tapes from its secure environment.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A breach of confidentiality always results in a breach of possession, a breach of possession does not always lead to a breach of confidentiality.

True

False

Answer explanation

Company stores data using an encrypted file system. An employee quits and decides to take a copy of the backup tape to sell to its competitor.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Possession

ensures that only users with the rights, privileges, and need to access information are able to do so

when information is in the same state in which it was created, placed, stored, or transferred.

information has value when it can serve a purpose.

the quality or state of ownership or control.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If information is available but is not in a meaningful format to the end user, it is not useful.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?