
Integrity Concerns Quiz
Authored by Derek DeMers
Computers
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Integrity?
Maintenance of data so as for it to remain constant unless authorized changes are made
Maintenance of data so as for it to change constantly unless authorized changes are made
Maintenance of data so as for it to remain constant unless unauthorized changes are made
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the four Integrity concerns?
Replay Attack, Adversary-in-the-middle Attack, Impersonation, and Unauthorized Information Alteration
Replay Attack, Impersonation, Authorized Information Alteration, and Adversary-in-the-middle Attack
Replay Attack, Adversary Attack, Impersonation, and Unauthorized Information Alteration
Replay Attack, Impersonation, Adversary Attack, and Authorized Information Alteration
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between an Adversary-in-the-middle Attack and a Replay Attack?
Replay Attack is a type of Adversary-in-the-middle Attack. It steals and sells information transmitted.
Replay Attack is a type of Adversary-in-the-middle Attack. It can only delay information transmitted.
Replay Attack is a type of Adversary-in-the-middle Attack. It repeats or delays information transmitted.
Replay Attack is a type of Adversary-in-the-middle Attack. It can only repeat information transmitted.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can you limit unauthorized information alteration?
Adversary-in-the-middle
Audit Log
Social Engineering
SSL/TLS
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one example of impersonation?
Dress as a clown for a job as a party clown
Login using a friends account and hack another computer
Dress up for graduation
Login using your own account and hack another computer
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do you prevent Adversary-in-the-middle Attacks?
Use devices that have certification-based authentication
Use devices that have a certificate of authenticity
Use any device
Use devices that have a certificate award of honor
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do you prevent Replay Attacks?
Use a website that has www
Use a website that has TLS
Use a website that has SSL
Use a website that has TLS or SSL
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
Computational Thinking & Searching Algorithm
Quiz
•
9th - 10th Grade
10 questions
Post Assessment - Cybersecurity Awareness
Quiz
•
9th Grade - Professio...
14 questions
Cyber Security - Social Engineering
Quiz
•
10th - 11th Grade
11 questions
CPU Cores
Quiz
•
10th - 11th Grade
12 questions
Drones. Good or bad?
Quiz
•
6th - 9th Grade
10 questions
Alghorithma
Quiz
•
12th Grade - University
10 questions
IT Unit 11: Cybersecurity (A2 System vulnerabilities)
Quiz
•
12th Grade
10 questions
Digital Security
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade