CIA, Actors & Authentication

CIA, Actors & Authentication

11th Grade

23 Qs

quiz-placeholder

Similar activities

STS Genap ASJ

STS Genap ASJ

11th Grade

25 Qs

Cambridge Technicals in IT - Unit 02 - LO6.4

Cambridge Technicals in IT - Unit 02 - LO6.4

11th - 12th Grade

25 Qs

WEB 1.2

WEB 1.2

11th Grade

20 Qs

Cyber 1 Networking FINAL

Cyber 1 Networking FINAL

9th - 12th Grade

20 Qs

Digital Citizenship Test

Digital Citizenship Test

7th Grade - University

20 Qs

Technology Fundamentals & Safety Practice Quiz

Technology Fundamentals & Safety Practice Quiz

11th Grade

20 Qs

bab8 kelas 9

bab8 kelas 9

9th Grade - University

20 Qs

مراجعة الوحدة 1+3

مراجعة الوحدة 1+3

9th - 12th Grade

20 Qs

CIA, Actors & Authentication

CIA, Actors & Authentication

Assessment

Quiz

Information Technology (IT)

11th Grade

Easy

Created by

BYRONELLE WILLIAMS

Used 1+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The skill level of _________ is always considered low as they rely on pre-existing tools rather than developing their own exploits.

state actors

hactivists

script kiddies

nation states

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The attacks of ________ are driven by cause rather than financial gain, and they are typically motivated by political, commercial, or economic ideologies.

shadow IT

insider threats

organized crime

hacktivists

3.

MATCH QUESTION

1 min • 1 pt

Match the following types of hackers

illegal activities for personal intent

grey hat

malicious, cause harm, want profit

white hat

identify & fix vulnerabilities

black hat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ have extensive resources and capabilities, often with full support of their governments, allowing them to carry out sophisticated exploits.

State Actors

Nation States

Shadow IT

Organized Crime Groups

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_________ are generally motivated by financial gain or power. They might sell data on the dark web, conduct espionage or disrupt normal business operations until ransom is paid.

Organized Crime Groups

Hacktivists

Script Kiddies

Insider Threats

6.

MATCH QUESTION

1 min • 1 pt

Match the following

Ensures authorized access

Confidentiality

Ensures data remains accurate

Accountability

Not part of the CIA Triad

Integrity

Ensures timely access to data

Availability

7.

MATCH QUESTION

1 min • 1 pt

Match the following AAA frameworks and components

Tracks activities

Authorization

Verifies the identity of users / systems

Accounting

Defines resources they can access

Authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?