Cybersecurity Chapter 2 Quiz

Cybersecurity Chapter 2 Quiz

12th Grade

21 Qs

quiz-placeholder

Similar activities

iGCSE Computer Science: Software

iGCSE Computer Science: Software

9th - 12th Grade

20 Qs

Computer Science Networks

Computer Science Networks

11th - 12th Grade

17 Qs

CIA Triad Summer School Exam 2

CIA Triad Summer School Exam 2

9th - 12th Grade

20 Qs

AP CSP Cybersecurity and Global Impacts

AP CSP Cybersecurity and Global Impacts

9th - 12th Grade

26 Qs

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

CompTIA Sec+ Chapter 3, 2nd Attempt Missed

12th Grade

23 Qs

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

CIA Triad Quiz Part A

CIA Triad Quiz Part A

12th Grade

20 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Cybersecurity Chapter 2 Quiz

Cybersecurity Chapter 2 Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Stella Lai

Used 7+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is identified by the first dimension of the cybersecurity cube?

tools

knowledge

goals

safeguards

rules

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are three types of sensitive information? (Choose three.)

declassified

published

classified

public

PII

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are two common hash functions? (Choose two.)

ECC

Blowfish

MD5

SHA

RC4

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service determines which resources a user can access along with the operations that a user can perform?

authentication

biometric

authorization

accounting

token

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

authentication

confidentiality

nonrepudiation

privacy

integrity

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What three design principles help to ensure high availability? (Choose three.)

detect failures as they occur

eliminate single points of failure

provide for reliable crossover

check for data consistency

use encryption

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

where you are

something you are

something you know

something you do

something you have

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?