
Cybersecurity I: Unit 1 - Foundations & Threats Exam Review
Authored by JEREMY MCINTYRE
Information Technology (IT)
9th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
37 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the CIA Triad the "C" stands for:
Continuation
Confidentiality
Congressional
Communication
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the CIA Triad the "A" stands for:
Authority
Authentication
Availability
Accountability
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a breach of integrity in the CIA Triad?
A DDoS attack that shuts down a website
A student getting a teacher password and changing the grades for the quiz
Your co-worker reading your emails without your permission
A hacker convinces elderly person to send money to get a friend out of jail
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
__________ is proving who you are, so trust can be established between you and another party.
Access
Authority
Authentication
Accounting
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A school ID is an example of _____ to prove who you are.
something you have
something you know
something you are
none of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A password is an example of ______ to prove who you are.
something you have
something you know
something you are
none of the above
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A software program that automates the process of trying all possible combinations of characters to determine a password.
Guess & Check
Stealing
Hackathon
Brute Force
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?