Tech+ 4.1 Open Book Questions

Tech+ 4.1 Open Book Questions

10th Grade

38 Qs

quiz-placeholder

Similar activities

Microsoft Power Point

Microsoft Power Point

9th - 12th Grade

40 Qs

UAS SMP Informatika Kelas IX 2024-2025

UAS SMP Informatika Kelas IX 2024-2025

9th Grade - University

40 Qs

Quiz Informatika Kelas X SMA

Quiz Informatika Kelas X SMA

10th Grade - University

40 Qs

KUIS INFORMATIKA

KUIS INFORMATIKA

10th Grade

37 Qs

Linux File Permissions / commands Basic Quiz

Linux File Permissions / commands Basic Quiz

10th Grade - University

36 Qs

STS INFORMATIKA X  CADANGAN

STS INFORMATIKA X CADANGAN

10th Grade

40 Qs

UH Materi Ms. Word

UH Materi Ms. Word

7th Grade - University

35 Qs

Internet Protocol (IP) Overview

Internet Protocol (IP) Overview

10th Grade

37 Qs

Tech+ 4.1 Open Book Questions

Tech+ 4.1 Open Book Questions

Assessment

Quiz

Information Technology (IT)

10th Grade

Practice Problem

Medium

Created by

Sean Carchidi

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

38 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What are the three principles of the CIA Triad in information security?

Confidentiality, Integrity, Availability

Confidentiality, Integrity, Accessibility

Confidentiality, Information, Availability

Confidentiality, Integrity, Authorization

2.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The CIA Triad can also be referred to as "AIC" to avoid confusion with which organization?

Central Intelligence Agency

Central Information Agency

Central Integrity Agency

Central Availability Agency

3.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

In the context of the CIA Triad, which principle ensures that information is only accessible to those who have been explicitly authorized?

A) Confidentiality

B) Integrity

C) Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

What is non-repudiation in the context of cybersecurity?

The ability to deny sending a message

The assurance that someone cannot deny the validity of something

The process of encrypting data

The method of detecting threats.

5.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

The NIST Cybersecurity Framework includes several functions. Which of the following is NOT one of them?

A) Identify

B) Protect

C) Attack

D) Recover

6.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Fill in the blank: The NIST Cybersecurity Framework function that involves restoring systems and data if other controls fail is called ________.

A) Identify

B) Protect

C) Detect

D) Recover

7.

MULTIPLE CHOICE QUESTION

30 sec • 3 pts

Why are computers considered high-value targets?

Because they are cheap

Because they store data

Because they are easy to steal

Because they are lightweight.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?