Cybersecurity

Cybersecurity

University

147 Qs

quiz-placeholder

Similar activities

DSC SEMESTER QUESTIONS

DSC SEMESTER QUESTIONS

University

149 Qs

Unit 3 & 18

Unit 3 & 18

University

144 Qs

ICT сессия

ICT сессия

University

152 Qs

kiemtra

kiemtra

University

149 Qs

tin học văn phòng 1

tin học văn phòng 1

University

144 Qs

ИКТ РК1

ИКТ РК1

University

145 Qs

SImulasi Ujian Tengah Semester Sistem Operasi

SImulasi Ujian Tengah Semester Sistem Operasi

University

150 Qs

Database & Design Ch.1-6 Midterm Review

Database & Design Ch.1-6 Midterm Review

University

150 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

University

Hard

Created by

jessica sansaricq

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

147 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ransomeware attack would result in a breach of possession because the owner would no longer have possession of the information.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ransomware attack

hacker attempts to steal sensitive information, typically in the form of usernames, passwords, credit card numbers, bank account information

hacker encrypts important information and offers to provide the decryption key for a fee.

hacker manipulate individuals and gain unauthorized access to a system by pretending to be someone they are not.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Because the data is encrypted, neither the former employee nor anyone else can read it without the proper decryption methods; therefore, there is no

breach of integrity

breach of possession

breach of confidentiality

breach of information

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Breach of possession the employee removed the tapes from its secure environment.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A breach of confidentiality always results in a breach of possession, a breach of possession does not always lead to a breach of confidentiality.

True

False

Answer explanation

Company stores data using an encrypted file system. An employee quits and decides to take a copy of the backup tape to sell to its competitor.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Possession

ensures that only users with the rights, privileges, and need to access information are able to do so

when information is in the same state in which it was created, placed, stored, or transferred.

information has value when it can serve a purpose.

the quality or state of ownership or control.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If information is available but is not in a meaningful format to the end user, it is not useful.

True

False

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?