1) Which of the following is not part of the CIA Triad? a) Confidentiality b) Integrity c) Authenticity d) Availability 2) Which of the following authentication methods is considered two-factor? a) Username and password b) Password and smart card c) Fingerprint scan only d) PIN code only 3) Which cybersecurity concept encourages users to have only the amount of access necessary to perform their jobs? a) Multi-factor Authentication b) Defense in Depth c) Principle of Least Privilege d) Separation of Duties 4) Which principle of information security helps in ensuring data has not been altered or tampered with? a) Confidentiality b) Integrity c) Availability d) Non-repudiation 5) What is the primary purpose of a firewall? a) Encrypt data at rest b) Detect unauthorized access to a network c) Block unauthorized network access d) Provide a backup for data 6) What is a key benefit of auditing in information security? a) Ensures system availability b) Deters unauthorized actions c) Guarantees data confidentiality d) Prevents denial-of-service attacks 7) What is an example of something you "have" in multi-factor authentication? a) Password b) Security Token c) Fingerprint d) Knowledge-based answer 8) What is the main focus of Confidentiality in the CIA Triad? a) Ensuring data is accurate b) Ensuring data is accessible only to authorized users c) Protecting data from being deleted d) Verifying data authenticity 9) The process of granting permissions to users based on their identity is known as: a) Authentication b) Identification c) Authorization d) Encryption 10) The main purpose of encryption is to ensure which of the following? a) Confidentiality b) Integrity c) Availability d) Accountability 11) Which of the following best defines Least Privilege? a) A method for authenticating users securely b) Ensuring users have only the access necessary to perform their job c) A principle ensuring all data is backed up regularly d) A tool used to prevent data leaks 12) What is a key element of Non-repudiation in cybersecurity? a) Ensuring data is backed up b) Ensuring a party cannot deny their actions c) Ensuring data is encrypted during transmission d) Ensuring data is protected from modification
0%
Cybersecurity Fundamentals
共用
共用
共用
由
Kkjoyner1
編輯內容
列印
嵌入
更多
作業
排行榜
顯示更多
顯示更少
此排行榜當前是私有的。單擊
共用
使其公開。
資源擁有者已禁用此排行榜。
此排行榜被禁用,因為您的選項與資源擁有者不同。
還原選項
測驗
是一個開放式範本。它不會為排行榜生成分數。
需要登錄
視覺風格
字體
需要訂閱
選項
切換範本
顯示所有
播放活動時將顯示更多格式。
打開結果
複製連結
QR 代碼
刪除
恢復自動保存:
?