
Cybersecurity Quiz 2
Authored by Tan Siewchoo
Computers
10th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the foundational principles identified in the first dimension of the Cybersecurity Cube?
Authentication, Authorization, and Accounting (AAA)
Confidentiality, Integrity, and Availability (CIA)
Encryption, Decryption, and Hashing
Prevention, Detection, and Response (PDR)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the second dimension of the Cybersecurity Cube focus on?
Protecting network infrastructure
Protecting physical security
Protecting the three principles of information security
Protecting the three states of data
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the three possible states of data in cyberspace, as mentioned in the text?
Data in storage, Data at risk, Data in process
Data at rest, Data in motion, Data in use
Data in transit, Data at rest, Data in process
Data encrypted, Data decrypted, Data hashed
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the third dimension of the Cybersecurity Cube define?
The goals of cybersecurity
The states of data in cyberspace
The skills and discipline for protection
The technologies, devices, and products used for protection
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the text(Chapter 2.1) emphasize as necessary in addition to technological tools for cybersecurity professionals to defeat cyber criminals?
Strong physical security
A legal background
Policies, procedures, and guidelines
Advanced encryption algorithms
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT one of the three principles of information security in the first dimension of the Cybersecurity Cube?
Confidentiality
Integrity
Availability
Authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the second dimension of the Cybersecurity Cube focus on protecting?
Network infrastructure
Physical security
The three principles of information security
The three states of data
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?