
Modelling Cyber Threats and Risk Mitigation Module 1
Quiz
•
Information Technology (IT)
•
9th Grade
•
Practice Problem
•
Hard
Heath McGregor
Used 1+ times
FREE Resource
Enhance your content in a minute
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the 2022 Optus data breach, sensitive customer information like names, birthdates, and passport numbers was exposed. Which fundamental principle of the CIA security model was most significantly compromised?
Confidentiality
Authentication
Integrity
Availability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee writes their complex network password on a sticky note and leaves it on their monitor. This action creates which primary type of security threat?
A technical threat
A logical threat
A social threat
A physical threat
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the process of verifying a user's identity before granting them access to a system called?
Configuration
Authorisation
Mitigation
Authentication
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company requires all staff to complete an annual training course on how to identify suspicious emails and the dangers of sharing account details. This is an example of a mitigation strategy for what kind of threat?
Social threats
Physical threats
Supply chain threats
Technical threats
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the Grokker Soccer Club scenario, an intruder broke into the clubhouse and found the password. This method of gaining access is best described as what type of threat?
A technical threat
A phishing threat
A denial-of-service threat
A physical threat
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hospital's electronic health record system is hit by a ransomware attack, encrypting all files and making them inaccessible to doctors and nurses. Which aspect of the CIA triad is most immediately impacted?
Confidentiality
Privacy
Integrity
Availability
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker gains access to a government database and subtly changes figures in a public census report before it is published. This action directly compromises the data's:
Security
Integrity
Availability
Confidentiality
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Tin 7 Bài 8
Quiz
•
7th Grade - University
11 questions
Keyboard Shortcuts
Quiz
•
5th Grade - University
10 questions
Informatika Kelas 9 Materi Algotirma dan Pemrograman
Quiz
•
9th Grade
10 questions
Tes Perkembangan Revolusi Industri
Quiz
•
5th Grade - University
10 questions
Exploring Loops in Scratch
Quiz
•
5th Grade - University
12 questions
Economia digital
Quiz
•
9th Grade
10 questions
Quiz aula 8
Quiz
•
9th - 12th Grade
10 questions
Aula 5
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Information Technology (IT)
20 questions
El Verbo IR Practice
Quiz
•
9th Grade
10 questions
Understanding Meiosis
Interactive video
•
6th - 10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
15 questions
Main Idea and Supporting Details.
Quiz
•
4th - 11th Grade
10 questions
Theme
Quiz
•
9th Grade
12 questions
Exponential Growth and Decay
Quiz
•
9th Grade
20 questions
Exponent Rules Review
Quiz
•
8th - 9th Grade
25 questions
Complementary and Supplementary Angles
Quiz
•
7th - 10th Grade
