
Security Basics Quiz
Authored by Ciara Williams
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
57 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the three properties of secure information referred to by the "CIA Triad"?
Confidentiality, Integrity, and Accessibility
Confidentiality, Integrity, and Availability
Confidentiality, Information, and Accessibility
Confidentiality, Information, and Availability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does confidentiality mean in the context of computer security?
Information is accessible to everyone
Information is only revealed to authorized users
Information is stored and transferred as intended
Information is available to modify
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does integrity mean in the context of computer security?
Information is accessible to everyone
Information is only revealed to authorized users
Information is stored and transferred as intended
Information is available to modify
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does availability mean in the context of computer security?
Information is accessible to everyone
Information is only revealed to authorized users
Information is stored and transferred as intended
Information is accessible to those authorized to view or modify it
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of security in computer systems?
To make information accessible to everyone
To control access to resources
To ensure information is always available
To prevent any modifications to information
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common misconception organizations have about their network security?
They believe their networks are always secure
They think their networks are always under attack
They assume their networks are never secure
They believe their networks are only secure with external help
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for an attempt to get access to information on a host or storage device that you are not authorized to view?
Eavesdropping
Snooping
Replay
Impersonation
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
56 questions
CompTia 1001 Exam Review
Quiz
•
10th Grade - University
55 questions
AIJ Firewall Proxy Mikrotik - PAS
Quiz
•
12th Grade
62 questions
Network Security - Practice Test #1
Quiz
•
10th Grade - University
56 questions
GRADE 8 4TH MONTHLY EXAM- COMPUTER 8
Quiz
•
8th Grade - University
55 questions
DDPTJKT - Penilaian Individual
Quiz
•
4th Grade - University
55 questions
AutoCAD Certification Quizziz
Quiz
•
9th - 12th Grade
55 questions
HTML Basics
Quiz
•
11th - 12th Grade
58 questions
Building Materials
Quiz
•
10th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade