Cybersecurity

Cybersecurity

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

Cybersecurity2

Cybersecurity2

12th Grade

20 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Cybersecurity Codehs

Cybersecurity Codehs

8th - 9th Grade

16 Qs

Studio - U3 LO1 - 1.1 Cyber Security Aims

Studio - U3 LO1 - 1.1 Cyber Security Aims

12th Grade

10 Qs

Welcome to Cyber Security

Welcome to Cyber Security

7th - 12th Grade

10 Qs

Unit 3 System Hardening Quiz

Unit 3 System Hardening Quiz

10th Grade

15 Qs

Computer Safety Quiz

Computer Safety Quiz

6th - 9th Grade

20 Qs

CSEC Information Technology: Computer Crimes pt2

CSEC Information Technology: Computer Crimes pt2

10th Grade

20 Qs

Cybersecurity

Cybersecurity

Assessment

Quiz

Computers

9th - 12th Grade

Easy

Created by

Karen Hersh

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

5 mins • 6 pts

Media Image

What is the practice of protecting systems, networks, and programs from digital attacks?

Cybersecurity

Firewalling

Disk partitioning

Installation

2.

MULTIPLE SELECT QUESTION

5 mins • 6 pts

Media Image

Cybersecurity can cover a whole range from fraudulent _______ to a targeted ________ of a website's traffic.

Select the TWO that complete the blanks.

emails

shutdown

phishing

attacks

3.

FILL IN THE BLANK QUESTION

5 mins • 10 pts

Media Image

A basic, overarching model for cybersecurity, particularly as it relates to information, is the __________.

4.

MULTIPLE CHOICE QUESTION

5 mins • 6 pts

Media Image

Confidentiality refers to protecting ___________ from eyes that shouldn’t have access to it/them.

fraudulent emails

private information

security policies

digital attacks

5.

MULTIPLE CHOICE QUESTION

5 mins • 6 pts

Media Image

Integrity refers to security controls that protect data from being changed or ______.

backed up

created

deleted

uploaded

6.

MULTIPLE CHOICE QUESTION

5 mins • 6 pts

Media Image

Availability refers to data being consistently, reliably available to...

authorized users

remote users

anyone

IT technicians

7.

MULTIPLE CHOICE QUESTION

5 mins • 6 pts

Media Image

Which pillar of the CIA triad refers to the principle that data is what we expect it to be?

Confidentiality

Integrity

Availability

Data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?