Tech+ 4.1 Open Book Questions

Tech+ 4.1 Open Book Questions

10th Grade

38 Qs

quiz-placeholder

Similar activities

Chapter 2.2.2 RFID Technology

Chapter 2.2.2 RFID Technology

7th Grade - University

35 Qs

BSFC IT Taster Session Quiz

BSFC IT Taster Session Quiz

9th - 10th Grade

39 Qs

Y9_Pictoblox AI_FA

Y9_Pictoblox AI_FA

9th - 12th Grade

40 Qs

Tech+ 4.3

Tech+ 4.3

10th Grade

39 Qs

TEST BANK: HARDWARE AND DIGITAL SECURITY

TEST BANK: HARDWARE AND DIGITAL SECURITY

9th - 12th Grade

35 Qs

Tech+ 5.3 Questions

Tech+ 5.3 Questions

10th Grade

37 Qs

TEST BANK: NETWORKS AND DIGITAL SECURITY

TEST BANK: NETWORKS AND DIGITAL SECURITY

9th - 12th Grade

35 Qs

Y10 revisionr

Y10 revisionr

9th Grade - University

39 Qs

Tech+ 4.1 Open Book Questions

Tech+ 4.1 Open Book Questions

Assessment

Quiz

Information Technology (IT)

10th Grade

Medium

Created by

Sean Carchidi

Used 1+ times

FREE Resource

38 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What are the three principles of the CIA Triad in information security?

Confidentiality, Integrity, Availability

Confidentiality, Integrity, Accessibility

Confidentiality, Information, Availability

Confidentiality, Integrity, Authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The CIA Triad can also be referred to as "AIC" to avoid confusion with which organization?

Central Intelligence Agency

Central Information Agency

Central Integrity Agency

Central Availability Agency

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

In the context of the CIA Triad, which principle ensures that information is only accessible to those who have been explicitly authorized?

A) Confidentiality

B) Integrity

C) Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What is non-repudiation in the context of cybersecurity?

The ability to deny sending a message

The assurance that someone cannot deny the validity of something

The process of encrypting data

The method of detecting threats.

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The NIST Cybersecurity Framework includes several functions. Which of the following is NOT one of them?

A) Identify

B) Protect

C) Attack

D) Recover

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Fill in the blank: The NIST Cybersecurity Framework function that involves restoring systems and data if other controls fail is called ________.

A) Identify

B) Protect

C) Detect

D) Recover

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Why are computers considered high-value targets?

Because they are cheap

Because they store data

Because they are easy to steal

Because they are lightweight.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?