Search Header Logo

Cyber I - 1.1 Quiz 2 - CIA Triad & Authentication

Authored by JEREMY MCINTYRE

Information Technology (IT)

9th - 12th Grade

Used 2+ times

Cyber I - 1.1 Quiz 2 - CIA Triad & Authentication
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT in the ethics agreement you signed?

I will not use any computer system to purchase products that are harmful to my developmental or emotional growth.

I will not intercept or otherwise monitor any network communications not explicitly intended for me.

I will not alter program or data or any files belonging to another person without the express consent of that person.

I will not execute any digital hoax or prank, no matter how harmless the effects of the action.

I will not gain access to any computer system that I am not authorized, by the administration of the system, to access

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The code of ethics agreement applies: (select all that are true)

On school grounds

Until graduation from HS

Only while enrolled in cybersecurity class in HS

Off school grounds

After graduation from HS

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT part of the model of Computer Security where Protection = ___+___+___.

Prosecution

Prevention

Detection

Response

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the CIA Triad - the "C" stands for:

Confidentiality

Congressional

Continuation

Communication

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the CIA Triad - the "A" stands for:

Availability

Authentication

Authority

Accountability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a breach of integrity in the CIA Triad?

A student getting a teacher password and changing the grades for the last quiz.

Your co-worker reading your emails without your permission

A DDoS Attack that shuts down a website

A hacker convincing an elderly person to send money to get a friend out of jail.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

__________ is proving who you are so trust can be established between you and another party.

Authentication

Access

Authority

Accounting

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?