Mod 2 Risk Adversity Trust

Mod 2 Risk Adversity Trust

9th Grade

20 Qs

quiz-placeholder

Similar activities

 CyberSecurity Exam 1

CyberSecurity Exam 1

9th - 12th Grade

25 Qs

Q3 SemEx

Q3 SemEx

9th - 12th Grade

25 Qs

The CIA Triad

The CIA Triad

9th Grade

20 Qs

Cyber 2 Module 9

Cyber 2 Module 9

9th Grade - Professional Development

21 Qs

Cyber - Unit 2 Review

Cyber - Unit 2 Review

9th - 12th Grade

20 Qs

PLTW Cybersecurity

PLTW Cybersecurity

9th - 12th Grade

20 Qs

Global Connectivity Quiz

Global Connectivity Quiz

9th - 12th Grade

15 Qs

Cybersecurity

Cybersecurity

7th - 12th Grade

20 Qs

Mod 2 Risk Adversity Trust

Mod 2 Risk Adversity Trust

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Quizizz Content

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

User error resulting in the access to, modification of, and disclosure confidential information assets represents a loss of:

Confidentiality

Confidentiality and Integrity

Availability and Integrity

Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The process of identifying the risks to system security and determining the probability of occurrence, the resulting impact, and the additional safeguards that mitigate this impact is known as:

CIA Triad

Risk Assessment

Incident Response

Risk Matrix

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?

Threat

Vulnerability

Attack

Exploit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Human error resulting in a loss of confidentiality, integrity, or availability to an information resource is known as a:

Threat

Vulnerability

Attack

Exploit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or false? Cybersecurity is a “hard problem” because cyberspace is large, interconnected, and complex.

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the purpose of a data classification system for cybersecurity?

To ensure filenames are compliant with the naming policy rules

To identify information assets and protect them from a loss of confidentiality, integrity and availability

To describe all possible vulnerabilities in the system

To initiate a threat assessment protocol

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Fire, flood, or an adverse weather event impacting the security of information assets is known as a:

Threat

Bug

Attack

Exploit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?