
Cybersecurity Chapter 2A Quiz

Quiz
•
Computers
•
12th Grade
•
Medium
Stella Lai
Used 3+ times
FREE Resource
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Describe the three dimensions of the McCumber Cube (Cybersecurity Cube).
Data Types, Access Controls, Risk Assessment
Network Protocols, Threat Models, Compliance Standards
User Authentication, Incident Response, Data Encryption
Information States, Security Measures, and Security Goals.
Answer explanation
The McCumber Cube's three dimensions are Information States (data at rest, in transit, and in use), Security Measures (controls and safeguards), and Security Goals (confidentiality, integrity, and availability), making this the correct choice.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Describe the principles of confidentiality, integrity, and availability.
Confidentiality ensures data is always available, integrity prevents data from being modified, and availability protects data from being lost.
Confidentiality protects information from unauthorized access, integrity ensures data accuracy and consistency, and availability guarantees access to information when required.
Confidentiality allows sharing information freely, integrity focuses on data speed, and availability restricts access to information.
Confidentiality is about data encryption, integrity is about data storage, and availability is about data backup.
Answer explanation
The correct choice accurately defines the principles: confidentiality protects against unauthorized access, integrity ensures data accuracy, and availability guarantees access when needed.
3.
OPEN ENDED QUESTION
3 mins • 1 pt
Differentiate the three states of data.
Evaluate responses using AI:
OFF
Answer explanation
Data exists in three states: structured (organized in a defined format), semi-structured (contains tags or markers for separation), and unstructured (no predefined format, like text or images). Each state serves different purposes.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Compare the types of cybersecurity countermeasures.
The types of cybersecurity countermeasures are offensive, defensive, and reactive.
The types of cybersecurity countermeasures are physical, administrative, and technical.
The types of cybersecurity countermeasures are analytical, strategic, and tactical.
The types of cybersecurity countermeasures are preventive, detective, and corrective.
Answer explanation
The correct choice identifies the three main types of cybersecurity countermeasures: preventive measures stop attacks before they occur, detective measures identify incidents as they happen, and corrective measures address and mitigate the impact after an incident.
5.
OPEN ENDED QUESTION
3 mins • 1 pt
Describe the ISO Cybersecurity Model.
Evaluate responses using AI:
OFF
Answer explanation
The ISO Cybersecurity Model provides a framework for managing cybersecurity risks, focusing on continuous improvement, risk assessment, and the integration of security into organizational processes to enhance resilience against threats.
6.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are the greatest challenges in protecting transmitted data?
Protecting data confidentiality
Protecting data integrity
Protecting data availability
Answer explanation
The greatest challenges in protecting transmitted data include ensuring confidentiality (preventing unauthorized access), integrity (maintaining accuracy), and availability (ensuring access when needed). All three are crucial for data security.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does data in process refer to?
Data in process refers to information currently being manipulated or transformed within a system.
Data in process means data that has been deleted.
Data in process is information stored on a hard drive.
Data in process refers to archived information.
Answer explanation
Data in process specifically refers to information that is actively being manipulated or transformed within a system, making it the correct choice. The other options describe different states of data.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
INFORMATIKA

Quiz
•
10th Grade - University
17 questions
Quiz Keamanan Jaringan

Quiz
•
11th Grade - University
15 questions
Cybersecurity Legal Duties Quiz

Quiz
•
12th Grade
18 questions
Cybersecurity

Quiz
•
12th Grade
20 questions
020_Threat Actors–CompTIA Security+ SY0-701 – 2.1

Quiz
•
9th - 12th Grade
20 questions
Understanding Security Concepts Quiz

Quiz
•
12th Grade
20 questions
Cyber - Unit 2 Review

Quiz
•
9th - 12th Grade
11 questions
18. Cyber security Threats Quiz

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade