Domain 1 - Network Security

Domain 1 - Network Security

9th Grade

46 Qs

quiz-placeholder

Similar activities

Uji Pengetahuan UKK TKJ 2023

Uji Pengetahuan UKK TKJ 2023

9th - 12th Grade

50 Qs

gamemaker

gamemaker

9th - 12th Grade

46 Qs

ÔN TẬP CHỦ ĐỀ F TIN 10

ÔN TẬP CHỦ ĐỀ F TIN 10

9th - 12th Grade

49 Qs

Информатика 7

Информатика 7

1st Grade - University

51 Qs

Storage Devices

Storage Devices

7th - 10th Grade

45 Qs

Data Security Complete wjec

Data Security Complete wjec

9th Grade

50 Qs

TEST EXCEL

TEST EXCEL

9th - 12th Grade

50 Qs

LATIHAN PAT INFORMATIKA KELAS X

LATIHAN PAT INFORMATIKA KELAS X

9th - 12th Grade

50 Qs

Domain 1 - Network Security

Domain 1 - Network Security

Assessment

Quiz

Computers

9th Grade

Practice Problem

Hard

Created by

Randy Manchester

Used 10+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

46 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which aspects of core security fall under the purview of confidentiality? Choose three (3) answers.

Controlling accessibility

Encryption

Tracking data

Strong authentication

Strict control of permissions

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are examples of levels of confidentiality utilized by organizations? Choose three answers.

Nonconfidential

Internal use only

Top secret

Public

Privileged

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match each of the following terms to their proper definitions.

AVAILABILITY: keeps data secure from unauthorized access

INTEGRITY: keeps data accurate and valid.

CONFIDENTIALITY: keeps data accessible to those who need it.

CONFIDENTIALITY: keeps data secure from unauthorized access

INTEGRITY: keeps data accurate and valid.

AVAILABILITY: keeps data accessible to those who need it.

AVAILABILITY: keeps data secure from unauthorized access

CONFIDENTIALITY: keeps data accurate and valid.

INTEGRITY: keeps data accessible to those who need it.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which methods can ensure the integrity of information, such as the contents of an email? Choose two answers.

Labels

A digital signature

A redundancy

MFA

Encryption

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

The availability part of the CIA triangle ensures that data is protected from which circumstances? Choose three answers.

Natural disaster

Malware

Equipment failure

Theft

Corporate mismanagement

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A RISK is the possibility of data being compromised. What word should replace RISK in order for the sentence to correct?

Vulnerability

Mitigation

The word is correct in the sentence

Threat

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a weakness in the CIA of data known as?

Threat

Risk

Vulnerability

Acceptance

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?