Unit 1 Test

Unit 1 Test

11th Grade

28 Qs

quiz-placeholder

Similar activities

T Level Digital Security Revision

T Level Digital Security Revision

11th Grade - University

24 Qs

Year 9 Cyber security

Year 9 Cyber security

9th - 12th Grade

23 Qs

Computer Quiz for Grade 11 (SDLC, Waterfall & Agile)

Computer Quiz for Grade 11 (SDLC, Waterfall & Agile)

11th Grade

23 Qs

CompTIA 220-902 Practice PM TEC

CompTIA 220-902 Practice PM TEC

11th - 12th Grade

26 Qs

Compute Systems Servicing COC1-COC2

Compute Systems Servicing COC1-COC2

11th - 12th Grade

25 Qs

PEM InterExp

PEM InterExp

11th - 12th Grade

25 Qs

Cyber security MCQ

Cyber security MCQ

11th Grade

25 Qs

Chủ đề: Excel 2007 (phần 2)

Chủ đề: Excel 2007 (phần 2)

2nd Grade - Professional Development

25 Qs

Unit 1 Test

Unit 1 Test

Assessment

Quiz

Computers

11th Grade

Practice Problem

Easy

Created by

Victoria Berkowitz

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the primary motivation for black hat hackers?

Financial gain

Ethical hacking

System improvement

Research

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What type of threat actor is the United States considered in the Stuxnet attack?

Organized Crime

Hacktivist

Competition

APT

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What are the three core components of the CIA Triad?

Confidentiality, Integrity, and Auditing

Confidentiality, Availability, and Integrity

Confidentiality, Authentication, and Availability

Confidentiality, Integrity, and Authorization

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which principle of the CIA Triad focuses on ensuring that data is accurate and reliable?

Confidentiality

Availability

Authentication

Integrity

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What type of hacker typically follows ethical guidelines to improve security?

Black hat hacker

Grey hat hacker

White hat hacker

Blue hat hacker

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which framework is used in network security for ensuring proper user access and tracking?

AAA framework

CIA Triad

NIST framework

ISO/IEC 27001

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the term for technology within an organization that operates without official approval?

Rogue IT

Shadow IT

Ghost IT

Phantom IT

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?