Unit 1 Test

Unit 1 Test

11th Grade

•

28 Qs

quiz-placeholder

Similar activities

Sales@Tally Quiz 1

Sales@Tally Quiz 1

10th Grade - Professional Development

•

25 Qs

REMEDIAL TKJ XI

REMEDIAL TKJ XI

11th Grade

•

24 Qs

ITS 101 14 Review

ITS 101 14 Review

10th Grade - Professional Development

•

25 Qs

Algorithms - python (GCSE)

Algorithms - python (GCSE)

10th - 12th Grade

•

25 Qs

ÔN TẬP BÀI 1 K11

ÔN TẬP BÀI 1 K11

11th Grade

•

23 Qs

Quiz 2  WordPress Intro

Quiz 2 WordPress Intro

8th Grade - University

•

24 Qs

Konfigurasi vlan

Konfigurasi vlan

11th Grade

•

25 Qs

Final Exam P3

Final Exam P3

9th - 12th Grade

•

26 Qs

Unit 1 Test

Unit 1 Test

Assessment

Quiz

•

Computers

•

11th Grade

•

Practice Problem

•

Easy

Created by

Victoria Berkowitz

Used 5+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the primary motivation for black hat hackers?

Financial gain

Ethical hacking

System improvement

Research

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What type of threat actor is the United States considered in the Stuxnet attack?

Organized Crime

Hacktivist

Competition

APT

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What are the three core components of the CIA Triad?

Confidentiality, Integrity, and Auditing

Confidentiality, Availability, and Integrity

Confidentiality, Authentication, and Availability

Confidentiality, Integrity, and Authorization

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which principle of the CIA Triad focuses on ensuring that data is accurate and reliable?

Confidentiality

Availability

Authentication

Integrity

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What type of hacker typically follows ethical guidelines to improve security?

Black hat hacker

Grey hat hacker

White hat hacker

Blue hat hacker

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which framework is used in network security for ensuring proper user access and tracking?

AAA framework

CIA Triad

NIST framework

ISO/IEC 27001

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the term for technology within an organization that operates without official approval?

Rogue IT

Shadow IT

Ghost IT

Phantom IT

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?