Quiz on Confidentiality and Information Security

Quiz on Confidentiality and Information Security

10th Grade

18 Qs

quiz-placeholder

Similar activities

Project Life Cycle

Project Life Cycle

10th - 12th Grade

20 Qs

Malware

Malware

9th - 11th Grade

15 Qs

PECs CSS 10

PECs CSS 10

10th Grade

15 Qs

IBA Chapter 10B

IBA Chapter 10B

8th - 12th Grade

17 Qs

Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

POCS-Ch. 2 Review (Comprehension)

POCS-Ch. 2 Review (Comprehension)

7th - 12th Grade

20 Qs

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

BTEC IT Level 3 D2 Protecting Data - firewalls, passwords, etc

7th - 12th Grade

20 Qs

Information Management Systems

Information Management Systems

9th - 12th Grade

22 Qs

Quiz on Confidentiality and Information Security

Quiz on Confidentiality and Information Security

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Jay Flute

Used 4+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does CIA stand for?

Confidentiality, Integrity, and Access

Confidentiality, Integrity, and Availability

Confidentiality, Integration, and Access

Confidentiality, Integration, and Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is confidentiality?

Ensuring identity

Integrity

Protection of information

Sharing of information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the five confidentiality concerns?

Snooping, Social Engineering, Dumpster Diving, Tapping, and Impersonation

Snooping, Eavesdropping, Dumpster Diving, Wiretapping, and Social Engineering

Snooping, Eavesdropping, Dumpster Diving, Wiretapping, and Socializing

Snooping, Eavesdropping, Recycle Swimming, Wiretapping, and Socializing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you do if you find an email to be suspicious?

Validate the identity of the sender

Troll the sender

Sweep the leg

Call the internet police

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

What is the method called where someone manipulates a person in order to gain information?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one method of protecting information?

Dumpster Diving

Fishing

Eavesdropping

File Encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Integrity?

Maintenance of data so as for it to remain constant unless authorized changes are made

Maintenance of data so as for it to change constantly unless authorized changes are made

Maintenance of data so as for it to remain constant unless unauthorized changes are made

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?