Unit 1 Test

Unit 1 Test

11th Grade

28 Qs

quiz-placeholder

Similar activities

CyberSecurity - Controls and Responses (Risk, Adversity & Trust)

CyberSecurity - Controls and Responses (Risk, Adversity & Trust)

9th - 12th Grade

23 Qs

Creating a Secure System (5.1 - 5.3)

Creating a Secure System (5.1 - 5.3)

9th - 12th Grade

30 Qs

Module 10 Post - Assessment

Module 10 Post - Assessment

11th Grade

25 Qs

Cybersecurity Ch 1 & 2

Cybersecurity Ch 1 & 2

9th - 12th Grade

25 Qs

Cyber security MCQ

Cyber security MCQ

11th Grade

25 Qs

T Level Digital Security Revision

T Level Digital Security Revision

11th Grade - University

24 Qs

Cybersecurity Quiz

Cybersecurity Quiz

11th Grade

25 Qs

Managing User Security 3.1

Managing User Security 3.1

9th - 12th Grade

25 Qs

Unit 1 Test

Unit 1 Test

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Victoria Berkowitz

Used 4+ times

FREE Resource

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the primary motivation for black hat hackers?

Financial gain

Ethical hacking

System improvement

Research

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What type of threat actor is the United States considered in the Stuxnet attack?

Organized Crime

Hacktivist

Competition

APT

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What are the three core components of the CIA Triad?

Confidentiality, Integrity, and Auditing

Confidentiality, Availability, and Integrity

Confidentiality, Authentication, and Availability

Confidentiality, Integrity, and Authorization

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which principle of the CIA Triad focuses on ensuring that data is accurate and reliable?

Confidentiality

Availability

Authentication

Integrity

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What type of hacker typically follows ethical guidelines to improve security?

Black hat hacker

Grey hat hacker

White hat hacker

Blue hat hacker

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which framework is used in network security for ensuring proper user access and tracking?

AAA framework

CIA Triad

NIST framework

ISO/IEC 27001

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the term for technology within an organization that operates without official approval?

Rogue IT

Shadow IT

Ghost IT

Phantom IT

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?