Cyber 2 Unit 1 Questions

Cyber 2 Unit 1 Questions

98 Qs

quiz-placeholder

Similar activities

Spanish Placement Exam

Spanish Placement Exam

9th - 12th Grade

97 Qs

7th Grade Civics Reporting Category 4

7th Grade Civics Reporting Category 4

7th Grade

100 Qs

601-700

601-700

12th Grade

100 Qs

Physical science final exam

Physical science final exam

KG - University

100 Qs

Physical Science Midterm Exam

Physical Science Midterm Exam

9th Grade

100 Qs

Chapter 1 Grammar Review

Chapter 1 Grammar Review

KG - University

100 Qs

FIN LIT FINAL

FIN LIT FINAL

KG - University

97 Qs

REPASO ESPAÑOL 1

REPASO ESPAÑOL 1

KG - University

100 Qs

Cyber 2 Unit 1 Questions

Cyber 2 Unit 1 Questions

Assessment

Quiz

others

Hard

Created by

Ann Root

FREE Resource

98 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of cybersecurity?

Improving internet speeds.
Improving gaming systems.
Increasing e-commerce revenue.
Preventing, detecting, and responding to attacks and disasters.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA Triad represent in cybersecurity?

Control, Inspection, and Authorization.
Confidentiality, Integrity, and Availability.
Availability, Integrity, and Analysis.
Authorization, Confidentiality, and Security.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why must data be protected?

Because it is valuable to individuals, organizations, and governments.
To comply with regulations.
To generate additional revenue.
To support social media algorithms.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the impact of a breach on critical infrastructure?

It improves access to social networks.
It disrupts essential services like transportation and energy.
It decreases internet traffic.
It increases energy consumption.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which concept ensures that data is accurate and trustworthy?

Availability.
Authorization.
Integrity.
Confidentiality.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does confidentiality protect data?

By encrypting all data.
By limiting access to authorized users.
By limiting physical access only.
By using stronger passwords only.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a cybersecurity adversary?

Hackers or state-sponsored attackers.
Insider threats.
Natural disasters.
AI-driven chatbots.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?