
CCST Cyber Quiz Test #1
Authored by Linda Berkheimer
Information Technology (IT)
9th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 2 pts
What are the objectives of ensuring data integrity? (Choose two correct answers)
Data is unaltered during transit
Data is not changed by unauthorized entities
Data is encrypted while in transit and when stored on disks
Access to the data is authenticated
Data is available all the time
Answer explanation
Explanation: The objectives for data integrity include data not being altered during transit and not being changed by unauthorized entities. Authentication and encryption are methods to ensure confidentiality. Data being available all the time is the goal of availability.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
Contact information
Next appointment
Patient records
First and last name
Answer explanation
Explanation: An email message is transmitted in plain text and can be read by anyone who has access to the data while it is en route to a destination. Patient records include confidential or sensitive information that should be transmitted in a secure manner.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best way to avoid getting spyware on a machine?
Install the latest antivirus updates
Install the latest web browser updates
Install software only from trusted websites
Install the latest operating system updates
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?
ISC2 Certified Information Systems Security Professional
ISACA CSX Cybersecurity Fundamentals
Microsoft Technology Associate Security Fundamentals
EC Council Certified Ethical Hacker
CompTIA Security+
Answer explanation
Explanation: This is an entry-level security certification that meets the U.S. Department of Defense Directive 8570.01-M requirements, which is an important item for anyone looking to work in IT security for the federal government.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?
EC Council Certified Ethical Hacker
Palo Alto Networks Certified Cybersecurity Associate
ISC2 Certified Information Systems Security Professional
Microsoft Technology Associate Security Fundamentals
CompTIA Security+
Answer explanation
Explanation: This certification tests your understanding and knowledge of how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker but in a lawful and legitimate manne
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
Buffer overflow
Race conditions
Weaknesses in security practices
Non-validated input
Access control problems
Answer explanation
Explanation: Systems and sensitive data can be protected through techniques such as authentication, authorization and encryption. Developers should stick to using security techniques and libraries that have already been created, tested and verified and should not attempt to create their own security algorithms. These will only likely introduce new vulnerabilities.
7.
MULTIPLE SELECT QUESTION
30 sec • 2 pts
Which of the following security implementations use biometrics? (Choose two correct answers)
Fingerprint
Phone
Credit card
Voice recognition
Fob
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?