IT Security Concepts

IT Security Concepts

12th Grade

8 Qs

quiz-placeholder

Similar activities

ICT BEL 4

ICT BEL 4

4th Grade - University

10 Qs

MIS-RODOCODO

MIS-RODOCODO

1st Grade - University

8 Qs

Databases - 1.2 Primary Key

Databases - 1.2 Primary Key

11th Grade - University

7 Qs

Y12 AS Level Computational Thinking Skills Quiz

Y12 AS Level Computational Thinking Skills Quiz

12th Grade

12 Qs

QUIZ PENGEMBANGAN WEB DENGAN AI

QUIZ PENGEMBANGAN WEB DENGAN AI

9th Grade - University

10 Qs

AP CK CyberSecurity Unit 3

AP CK CyberSecurity Unit 3

12th Grade

10 Qs

Soal Koding dan KA Dwinov

Soal Koding dan KA Dwinov

10th Grade - University

10 Qs

Securing Information Systems - Chapter 10

Securing Information Systems - Chapter 10

12th Grade

10 Qs

IT Security Concepts

IT Security Concepts

Assessment

Quiz

Information Technology (IT)

12th Grade

Medium

Created by

Lyle Lyle

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

What are the three components of the CIA Triad?

Confidentiality

Integrity

Availability

Auditability

Authenticity

2.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

What tools help protect confidentiality?

Cryptography

Access controls

Firewalls

Debugging tools

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

The CIA triad stands for ________, Integrity, and Availability.

4.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of the following are threats to confidentiality?

Social engineering

Malware

Poor system administration

Audit logs

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which concept focuses on ensuring data is accurate, trustworthy, and complete?

Confidentiality

Integrity

Authenticity

Privacy

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a major attack method that targets availability?

Phishing

Keylogging

Brute-force attack

Denial of Service (DoS)

7.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

________ attacks attempt to make systems unavailable to their users.

8.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of the following belong to the extended IAS-Octave model?

Privacy

Non-repudiation

Firewall

Authenticity

Debugging