Modelling Cyber Threats and Risk Mitigation Module 1

Modelling Cyber Threats and Risk Mitigation Module 1

9th Grade

9 Qs

quiz-placeholder

Similar activities

8th Social Media and Modern Communication Assessment

8th Social Media and Modern Communication Assessment

8th Grade - University

10 Qs

Electricidad y Electrónica 3º ESO

Electricidad y Electrónica 3º ESO

9th Grade

12 Qs

REVIEW TIME

REVIEW TIME

9th Grade - University

10 Qs

Programming Bach

Programming Bach

9th - 12th Grade

14 Qs

CyberSmart Quiz

CyberSmart Quiz

9th - 12th Grade

4 Qs

Uji Pengetahuan Keamanan Data

Uji Pengetahuan Keamanan Data

9th Grade

10 Qs

Se liga - 1° Trimestre

Se liga - 1° Trimestre

9th Grade

13 Qs

UHB Informatika Kelas IX

UHB Informatika Kelas IX

9th Grade

10 Qs

Modelling Cyber Threats and Risk Mitigation Module 1

Modelling Cyber Threats and Risk Mitigation Module 1

Assessment

Quiz

Information Technology (IT)

9th Grade

Practice Problem

Hard

Created by

Heath McGregor

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the 2022 Optus data breach, sensitive customer information like names, birthdates, and passport numbers was exposed. Which fundamental principle of the CIA security model was most significantly compromised?

Confidentiality

Authentication

Integrity

Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee writes their complex network password on a sticky note and leaves it on their monitor. This action creates which primary type of security threat?

A technical threat

A logical threat

A social threat

A physical threat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of verifying a user's identity before granting them access to a system called?


Configuration

Authorisation

Mitigation

Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company requires all staff to complete an annual training course on how to identify suspicious emails and the dangers of sharing account details. This is an example of a mitigation strategy for what kind of threat?

Social threats

Physical threats

Supply chain threats

Technical threats

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Grokker Soccer Club scenario, an intruder broke into the clubhouse and found the password. This method of gaining access is best described as what type of threat?

A technical threat

A phishing threat

A denial-of-service threat

A physical threat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hospital's electronic health record system is hit by a ransomware attack, encrypting all files and making them inaccessible to doctors and nurses. Which aspect of the CIA triad is most immediately impacted?

Confidentiality

Privacy

Integrity

Availability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker gains access to a government database and subtly changes figures in a public census report before it is published. This action directly compromises the data's:

Security

Integrity

Availability

Confidentiality

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?