
Domain 1 - Network Security
Authored by Randy Manchester
Computers
9th Grade
Used 10+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
46 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which aspects of core security fall under the purview of confidentiality? Choose three (3) answers.
Controlling accessibility
Encryption
Tracking data
Strong authentication
Strict control of permissions
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following are examples of levels of confidentiality utilized by organizations? Choose three answers.
Nonconfidential
Internal use only
Top secret
Public
Privileged
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match each of the following terms to their proper definitions.
AVAILABILITY: keeps data secure from unauthorized access
INTEGRITY: keeps data accurate and valid.
CONFIDENTIALITY: keeps data accessible to those who need it.
CONFIDENTIALITY: keeps data secure from unauthorized access
INTEGRITY: keeps data accurate and valid.
AVAILABILITY: keeps data accessible to those who need it.
AVAILABILITY: keeps data secure from unauthorized access
CONFIDENTIALITY: keeps data accurate and valid.
INTEGRITY: keeps data accessible to those who need it.
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which methods can ensure the integrity of information, such as the contents of an email? Choose two answers.
Labels
A digital signature
A redundancy
MFA
Encryption
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
The availability part of the CIA triangle ensures that data is protected from which circumstances? Choose three answers.
Natural disaster
Malware
Equipment failure
Theft
Corporate mismanagement
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A RISK is the possibility of data being compromised. What word should replace RISK in order for the sentence to correct?
Vulnerability
Mitigation
The word is correct in the sentence
Threat
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a weakness in the CIA of data known as?
Threat
Risk
Vulnerability
Acceptance
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?