
Cybersecurity Chapter 2A Quiz
Authored by Stella Lai
Computers
12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Describe the three dimensions of the McCumber Cube (Cybersecurity Cube).
Data Types, Access Controls, Risk Assessment
Network Protocols, Threat Models, Compliance Standards
User Authentication, Incident Response, Data Encryption
Information States, Security Measures, and Security Goals.
Answer explanation
The McCumber Cube's three dimensions are Information States (data at rest, in transit, and in use), Security Measures (controls and safeguards), and Security Goals (confidentiality, integrity, and availability), making this the correct choice.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Describe the principles of confidentiality, integrity, and availability.
Confidentiality ensures data is always available, integrity prevents data from being modified, and availability protects data from being lost.
Confidentiality protects information from unauthorized access, integrity ensures data accuracy and consistency, and availability guarantees access to information when required.
Confidentiality allows sharing information freely, integrity focuses on data speed, and availability restricts access to information.
Confidentiality is about data encryption, integrity is about data storage, and availability is about data backup.
Answer explanation
The correct choice accurately defines the principles: confidentiality protects against unauthorized access, integrity ensures data accuracy, and availability guarantees access when needed.
3.
OPEN ENDED QUESTION
3 mins • 1 pt
Differentiate the three states of data.
Evaluate responses using AI:
OFF
Answer explanation
Data exists in three states: structured (organized in a defined format), semi-structured (contains tags or markers for separation), and unstructured (no predefined format, like text or images). Each state serves different purposes.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Compare the types of cybersecurity countermeasures.
The types of cybersecurity countermeasures are offensive, defensive, and reactive.
The types of cybersecurity countermeasures are physical, administrative, and technical.
The types of cybersecurity countermeasures are analytical, strategic, and tactical.
The types of cybersecurity countermeasures are preventive, detective, and corrective.
Answer explanation
The correct choice identifies the three main types of cybersecurity countermeasures: preventive measures stop attacks before they occur, detective measures identify incidents as they happen, and corrective measures address and mitigate the impact after an incident.
5.
OPEN ENDED QUESTION
3 mins • 1 pt
Describe the ISO Cybersecurity Model.
Evaluate responses using AI:
OFF
Answer explanation
The ISO Cybersecurity Model provides a framework for managing cybersecurity risks, focusing on continuous improvement, risk assessment, and the integration of security into organizational processes to enhance resilience against threats.
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are the greatest challenges in protecting transmitted data?
Protecting data confidentiality
Protecting data integrity
Protecting data availability
Answer explanation
The greatest challenges in protecting transmitted data include ensuring confidentiality (preventing unauthorized access), integrity (maintaining accuracy), and availability (ensuring access when needed). All three are crucial for data security.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does data in process refer to?
Data in process refers to information currently being manipulated or transformed within a system.
Data in process means data that has been deleted.
Data in process is information stored on a hard drive.
Data in process refers to archived information.
Answer explanation
Data in process specifically refers to information that is actively being manipulated or transformed within a system, making it the correct choice. The other options describe different states of data.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Network topologies
Quiz
•
8th Grade - University
15 questions
Quiz 1
Quiz
•
1st - 12th Grade
15 questions
Data Security Worksheet
Quiz
•
10th Grade - University
15 questions
LATIHAN SOAL PEMROGRAMAN
Quiz
•
9th Grade - University
20 questions
QUIZ BAB 4: SISTEM OPERASI
Quiz
•
8th Grade - University
11 questions
Threats to Data
Quiz
•
9th - 12th Grade
20 questions
KELAS 7 1
Quiz
•
9th - 12th Grade
15 questions
1.1.1 The structure and function of the processor
Quiz
•
11th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade