1.1 Cybersecurity Fundamentals - AP Cyber2

1.1 Cybersecurity Fundamentals - AP Cyber2

10th Grade

25 Qs

quiz-placeholder

Similar activities

UTS KELAS X SEMESTER GANJIL

UTS KELAS X SEMESTER GANJIL

10th Grade

20 Qs

Quiz Berpikir Komputasional

Quiz Berpikir Komputasional

10th Grade

20 Qs

Search Engine dan Validitas Sumber Data

Search Engine dan Validitas Sumber Data

10th Grade

20 Qs

DPK 4.4

DPK 4.4

10th Grade

20 Qs

Algoritma Pemrograman

Algoritma Pemrograman

10th Grade

21 Qs

Ulangan harian bab 1 informatika kelas 10

Ulangan harian bab 1 informatika kelas 10

10th Grade

22 Qs

Sumatif Bab 1 (Informatika & Kemampuan Umum")

Sumatif Bab 1 (Informatika & Kemampuan Umum")

10th Grade - University

20 Qs

Evaluasi Pemahaman Analisis Data

Evaluasi Pemahaman Analisis Data

10th Grade

20 Qs

1.1 Cybersecurity Fundamentals - AP Cyber2

1.1 Cybersecurity Fundamentals - AP Cyber2

Assessment

Quiz

Information Technology (IT)

10th Grade

Practice Problem

Easy

Created by

Kari Cobb

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of cybersecurity?

Preventing, detecting, and responding to attacks and disasters.
Improving internet speeds.
Increasing e-commerce revenue.
Improving gaming systems.
Pluto

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA Triad represent in cybersecurity?

Confidentiality, Integrity, and Availability.
Control, Inspection, and Authorization.
Availability, Integrity, and Analysis.
Authorization, Confidentiality, and Security.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why must data be protected?

Because it is valuable to individuals, organizations, and governments.
To support social media algorithms.
To comply with regulations.
To generate additional revenue.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the impact of a breach on critical infrastructure?

It disrupts essential services like transportation and energy.
It increases energy consumption.
It improves access to social networks.
It decreases internet traffic.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which concept ensures that data is accurate and trustworthy?

Integrity.
Confidentiality.
Availability.
Authorization.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does confidentiality protect data?

By limiting access to authorized users.
By encrypting all data.
By using stronger passwords only.
By limiting physical access only.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a cybersecurity adversary?

Hackers or state-sponsored attackers.
Natural disasters.
AI-driven chatbots.
Insider threats.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?