Mod 2 Risk Adversity Trust
Quiz
•
Information Technology (IT)
•
9th - 12th Grade
•
Medium
PJ Johnson
Used 2+ times
FREE Resource
29 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement describes why information assets must be identified for cybersecurity purposes?
Because you cannot protect what you have not identified
Because you should only protect what you have identified
Because you can only identify some information assets
Because you should only identify those information assets that are the most important
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement describes the purpose of a data classification system for cybersecurity?
To ensure filenames are compliant with the naming policy rules
To identify information assets and protect them from a loss of confidentiality, integrity and availability
To describe all possible vulnerabilities in the system
To initiate a threat assessment protocol
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Inappropriate file access to, or disclosure of, protectively marked information, whether by an adversary or accidentally, is a loss of:
Availability
Confidentiality
Integrity
Availability and Confidentiality
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
User error resulting in the access to, modification of, and disclosure confidential information assets represents a loss of:
Confidentiality
Confidentiality and Integrity
Availability and Integrity
Availability
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used to describe ensuring that authorized parties are able to access the information when it is needed?
Confidentiality
Integrity
Availability
Asset identification
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term refers to a circumstance or event with the potential to have an adverse effect on organizational operations?
Threat
Vulnerability
Attack
Exploit
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?
Threat
Vulnerability
Attack
Exploit
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
25 questions
Keamanan Jaringan Sesi 2
Quiz
•
12th Grade
25 questions
Cambridge Technicals in IT - Unit 02 - LO6.4
Quiz
•
11th - 12th Grade
26 questions
AAA Framework Quiz
Quiz
•
9th - 12th Grade
34 questions
Unit 1 - CyberPatriot Open Notes Test
Quiz
•
9th Grade
25 questions
Kuis Keamanan Data dan Informasi
Quiz
•
9th Grade - University
30 questions
แข่งขันการตอบปัญหาสัปดาห์วิทยาศาสตร์ ระดับ ม.ปลาย 2568
Quiz
•
11th Grade
30 questions
Database Management System Quiz
Quiz
•
11th Grade
25 questions
Teljesítmény és biztonsági tesztelés
Quiz
•
12th Grade
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
Discover more resources for Information Technology (IT)
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
20 questions
Halloween movies trivia
Quiz
•
7th - 12th Grade
15 questions
Halloween Characters
Quiz
•
7th - 12th Grade
10 questions
Halloween Movies Trivia
Quiz
•
5th Grade - University
10 questions
Halloween Trivia Challenge
Interactive video
•
6th - 10th Grade
10 questions
Understanding Meiosis
Interactive video
•
6th - 10th Grade
11 questions
Halloween Trivia #2
Quiz
•
12th Grade
14 questions
Halloween Fun
Quiz
•
2nd - 12th Grade
