Cybersecurity

Cybersecurity

12th Grade

24 Qs

quiz-placeholder

Similar activities

Data structure test1

Data structure test1

12th Grade

20 Qs

Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ

Latihan Soal Administrasi Infrastruktur Jaringan XII TKJ

10th - 12th Grade

20 Qs

TEST1.PY

TEST1.PY

10th Grade - University

20 Qs

Berpikir Komputasional

Berpikir Komputasional

9th - 12th Grade

20 Qs

UH 1 Teknologi wan

UH 1 Teknologi wan

12th Grade

20 Qs

FNaF1

FNaF1

4th - 12th Grade

19 Qs

ON TAP TIN 11

ON TAP TIN 11

1st - 12th Grade

20 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

12th Grade

Practice Problem

Medium

Created by

Ron F.

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What are the three main goals of cybersecurity?

efficiency, speed, availability
secrecy, integrity, availability
confidentiality, complexity, security
secrecy, speed, control

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is an attack on secrecy?

data breaches revealing credit card information
denial of service attacks
masquerading emails
overloading websites

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What does integrity in cybersecurity mean?

only authorized people can access data
only authorized people can modify systems and data
only authorized people can deny access
only authorized people can create data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

An example of an availability attack is:

a data breach
a masquerading email
a denial of service attack
a phishing scam

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is a Threat Model?

a profile of potential attackers
a type of cybersecurity software
a data protection technique
a physical security measure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is an Attack Vector?

the means by which an attack is carried out
a type of firewall
a security protocol
an encryption method

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What is the process of confirming a user's identity called?

authorization
authentication
verification
encryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?