Integrity Concerns Quiz

Integrity Concerns Quiz

9th - 12th Grade

9 Qs

quiz-placeholder

Similar activities

Social Engineering Game

Social Engineering Game

9th - 12th Grade

12 Qs

Countermeasures

Countermeasures

9th - 12th Grade

10 Qs

Initialization Vector (IV) Attack

Initialization Vector (IV) Attack

11th Grade

11 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Social Engineering

Social Engineering

11th Grade

12 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

10.2 Cybersecurity

10.2 Cybersecurity

9th - 12th Grade

14 Qs

Security Fundamentals Review 1

Security Fundamentals Review 1

11th Grade

10 Qs

Integrity Concerns Quiz

Integrity Concerns Quiz

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Derek DeMers

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Integrity?

Maintenance of data so as for it to remain constant unless authorized changes are made

Maintenance of data so as for it to change constantly unless authorized changes are made

Maintenance of data so as for it to remain constant unless unauthorized changes are made

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the four Integrity concerns?

Replay Attack, Adversary-in-the-middle Attack, Impersonation, and Unauthorized Information Alteration

Replay Attack, Impersonation, Authorized Information Alteration, and Adversary-in-the-middle Attack

Replay Attack, Adversary Attack, Impersonation, and Unauthorized Information Alteration

Replay Attack, Impersonation, Adversary Attack, and Authorized Information Alteration

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between an Adversary-in-the-middle Attack and a Replay Attack?

Replay Attack is a type of Adversary-in-the-middle Attack. It steals and sells information transmitted.

Replay Attack is a type of Adversary-in-the-middle Attack. It can only delay information transmitted.

Replay Attack is a type of Adversary-in-the-middle Attack. It repeats or delays information transmitted.

Replay Attack is a type of Adversary-in-the-middle Attack. It can only repeat information transmitted.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can you limit unauthorized information alteration?

Adversary-in-the-middle

Audit Log

Social Engineering

SSL/TLS

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one example of impersonation?

Dress as a clown for a job as a party clown

Login using a friends account and hack another computer

Dress up for graduation

Login using your own account and hack another computer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do you prevent Adversary-in-the-middle Attacks?

Use devices that have certification-based authentication

Use devices that have a certificate of authenticity

Use any device

Use devices that have a certificate award of honor

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do you prevent Replay Attacks?

Use a website that has www

Use a website that has TLS

Use a website that has SSL

Use a website that has TLS or SSL

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does TLS stand for?

Transport Layer Socket

Transport Lock Socket

Transfer Layer Security

Transport Layer Security

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What sort of information should keep its integrity?

Locker Numbers

Phone Numbers

Nicknames

Social Security Numbers