Search Header Logo

Cybersecurity Chapter 2A Quiz

Authored by Stella Lai

Computers

12th Grade

Used 3+ times

Cybersecurity Chapter 2A Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe the three dimensions of the McCumber Cube (Cybersecurity Cube).

Data Types, Access Controls, Risk Assessment

Network Protocols, Threat Models, Compliance Standards

User Authentication, Incident Response, Data Encryption

Information States, Security Measures, and Security Goals.

Answer explanation

The McCumber Cube's three dimensions are Information States (data at rest, in transit, and in use), Security Measures (controls and safeguards), and Security Goals (confidentiality, integrity, and availability), making this the correct choice.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe the principles of confidentiality, integrity, and availability.

Confidentiality ensures data is always available, integrity prevents data from being modified, and availability protects data from being lost.

Confidentiality protects information from unauthorized access, integrity ensures data accuracy and consistency, and availability guarantees access to information when required.

Confidentiality allows sharing information freely, integrity focuses on data speed, and availability restricts access to information.

Confidentiality is about data encryption, integrity is about data storage, and availability is about data backup.

Answer explanation

The correct choice accurately defines the principles: confidentiality protects against unauthorized access, integrity ensures data accuracy, and availability guarantees access when needed.

3.

OPEN ENDED QUESTION

3 mins • 1 pt

Differentiate the three states of data.

Evaluate responses using AI:

OFF

Answer explanation

Data exists in three states: structured (organized in a defined format), semi-structured (contains tags or markers for separation), and unstructured (no predefined format, like text or images). Each state serves different purposes.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Compare the types of cybersecurity countermeasures.

The types of cybersecurity countermeasures are offensive, defensive, and reactive.

The types of cybersecurity countermeasures are physical, administrative, and technical.

The types of cybersecurity countermeasures are analytical, strategic, and tactical.

The types of cybersecurity countermeasures are preventive, detective, and corrective.

Answer explanation

The correct choice identifies the three main types of cybersecurity countermeasures: preventive measures stop attacks before they occur, detective measures identify incidents as they happen, and corrective measures address and mitigate the impact after an incident.

5.

OPEN ENDED QUESTION

3 mins • 1 pt

Describe the ISO Cybersecurity Model.

Evaluate responses using AI:

OFF

Answer explanation

The ISO Cybersecurity Model provides a framework for managing cybersecurity risks, focusing on continuous improvement, risk assessment, and the integration of security into organizational processes to enhance resilience against threats.

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the greatest challenges in protecting transmitted data?

Protecting data confidentiality

Protecting data integrity

Protecting data availability

Answer explanation

The greatest challenges in protecting transmitted data include ensuring confidentiality (preventing unauthorized access), integrity (maintaining accuracy), and availability (ensuring access when needed). All three are crucial for data security.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does data in process refer to?

Data in process refers to information currently being manipulated or transformed within a system.

Data in process means data that has been deleted.

Data in process is information stored on a hard drive.

Data in process refers to archived information.

Answer explanation

Data in process specifically refers to information that is actively being manipulated or transformed within a system, making it the correct choice. The other options describe different states of data.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?