Grade 11 Worksheet PDF
Document Details
Uploaded by WinningOrientalism
Thebes El-Maadi American-British School
2024
Dr.Madiha Ibrahim
Tags
Summary
This is a Grade 11 worksheet on the topics of cyber security and advanced multimedia. The worksheet contains multiple-choice questions, focusing on concepts like data integrity, confidentiality, and the CIA Triad. The document was produced in 2024.
Full Transcript
CYPER SECURITY & ADVANCED MULTIMEDIA Dr.Madiha Ibrahim 2024-2025 Multiple-choice questions 1- What does data integrity refer to in cybersecurity? A) Assurance that data has not been modified B) The speed of data transmission C...
CYPER SECURITY & ADVANCED MULTIMEDIA Dr.Madiha Ibrahim 2024-2025 Multiple-choice questions 1- What does data integrity refer to in cybersecurity? A) Assurance that data has not been modified B) The speed of data transmission C) The amount of data stored D) The cost of data management 2- Which of the following is NOT a key aspect of data integrity? A) Accuracy B) Completeness C) Speed D) Authenticity 3- What does confidentiality in data integrity mean? A) Data is accurate and free from errors B) Data is protected from unauthorized access C) Data is whole and not missing any parts D) Data is consistent with other related data 4- What is the CIA Triad in cybersecurity? A) Confidentiality, Integrity, Availability B) Control, Integrity, Access C) Confidentiality, Information, Access D) Control, Information, Availability 5- What is one advantage of cybersecurity mentioned in the document? A) Increased data storage B) Protection against unauthorized access C) Faster internet speeds D) Lower costs for data management 6- What does data integrity ensure in cybersecurity? A) Data is modified by unauthorized individuals B) Data remains accurate, complete, and trustworthy C) Data is always accessible to everyone D) Data can be deleted without permission 7- Which of the following is NOT a key aspect of data integrity? A) Accuracy B) Completeness C) Confidentiality D) Obsolescence | Page1 8- What does the 'C' in the CIA Triad stand for? A) Confidentiality B) Consistency C) Completeness D) Cybersecurity 9-. What is the primary focus of cybersecurity according to the document? A) To ensure data integrity B) To prevent cyber crimes C) To promote internet safety D) To enhance data accessibility 10- Which of the following describes the concept of authenticity in data integrity? A) Data is free from errors B) Data is genuine and from a reliable source C) Data is protected from unauthorized access D) Data is complete and whole 11- What does data integrity ensure in cybersecurity? A )Data remains accurate and trustworthy B)Data is always accessible C)Data is modified by authorized users D)Data is stored in the cloud 12- What is meant by the authenticity of data in cybersecurity? A)Data is easily accessible B)Data is stored securely C)Data is genuine and from a reliable source D)Data is encrypted 13-Which of the following is NOT a key aspect of data integrity? A)Confidentiality B)Availability C)Accuracy D)Completeness 14- In the context of data integrity, what does consistency refer to? A)Data is whole B)Data aligns with related data C)Data is free from errors D)Data is protected from unauthorized access | Page2 15-What does confidentiality in data integrity imply? A)Data is protected from unauthorized access B)Data is complete C)Data is accurate D)Data is consistent 16- Which of the following best describes the concept of integrity in cybersecurity? A)Data can be easily modified B)Data remains unchanged by unauthorized individuals C)Data is always available D)Data is stored in multiple locations 17- What is the primary concern of data integrity? A)Data modification B)Data accuracy C)Data availability D)Data encryption 18- What does data integrity ensure in cybersecurity? A)Data remains accurate and trustworthy B)Data is always accessible C)Data is modified by authorized users D)Data is stored in the cloud 19- What is meant by the authenticity of data in cybersecurity? A)Data is easily accessible B)Data is stored securely C)Data is genuine and from a reliable source D)Data is encrypted 20- Which of the following is NOT a key aspect of data integrity? A)Confidentiality B)Availability C)Accuracy D)Completeness 21- In the context of data integrity, what does consistency refer to? A)Data is whole B)Data aligns with related data C)Data is free from errors D)Data is protected from unauthorized access | Page3 22- What does confidentiality in data integrity imply? A)Data is protected from unauthorized access B)Data is complete C)Data is accurate D)Data is consistent 23- Which of the following best describes the concept of integrity in cybersecurity? A)Data can be easily modified B)Data remains unchanged by unauthorized individuals C)Data is always available D)Data is stored in multiple locations 24- What is the primary concern of data integrity? A)Data modification B)Data accuracy C)Data availability D)Data encryption 25- Which of the following ensures that no one can change the content of a document without permission? A)Confidentiality B)Availability C)Integrity D)Authenticity 26) What does DoS stand for in the context of network security? A)Denial of Service B)Distributed Denial of Service C)Data Overload System D)Direct Online Service 27) In a DDoS attack, how many devices are typically involved? A)Multiple B)Two C)One D)None 28- What is the primary goal of a DoS attack? A)To flood the network B)To steal data C)To install malware D)To gain unauthorized access | Page4 29-Which of the following best describes a DDoS attack? A)A passive network scan B)Multiple hosts attacking simultaneously C)A single host attacking D)A software update process 30- What does DoS stand for in the context of network security? A)Denial of Service B)Distributed Denial of Service C)Data Overload System D)Direct Online Service 31-In a DDoS attack, how many devices are typically involved? A)Multiple B)Two C)One D)None 32-What is the primary goal of a DoS attack? A)To flood the network B)To steal data C)To install malware D)To gain unauthorized access 33-Which of the following best describes a DDoS attack? A)A passive network scan B)Multiple hosts attacking simultaneously C)A single host attacking D)A software update process 34-What is a common method used in DoS attacks to exhaust server resources? A)Creating backups B)Sending fake requests C)Encrypting data D)Updating software 35-What is the primary purpose of network security solutions? A)To increase internet speed B)To identify and block attacks C)To enhance user experience D)To manage cloud resources | Page5 36- Which of the following is NOT a component of a cloud security strategy? A)Cyber security solutions B)Access controls C)Data Loss Prevention D)Network performance monitoring 37-What does the zero-trust security model emphasize? A)Creating micro-segments around data B)Using only firewalls for protection C)Trusting all users by default D)Limiting access to only IT staff 38-What type of security is used to protect end-user devices like desktops and laptops? A)Endpoint security B)Network Access Control C)Data Loss Prevention D)Identity Access Management 39-Which of the following threats can mobile devices expose businesses to? A)Hardware failures B)Malicious apps C)Increased bandwidth D)Software updates 40-What does IAM stand for in the context of network security? A)Internet Access Management B)Integrated Application Management C)Identity Access Management D)Internal Asset Management 41- What is the primary purpose of mobile security? A)To prevent attacks and secure operating systems B)To increase battery life C)To enhance device performance D)To improve user interface 42-What is the primary purpose of network security solutions? A)To increase internet speed B)To identify and block attacks C)To enhance user experience D)To manage cloud resources | Page6 43-Which of the following is NOT a component of a cloud security strategy? A)Cyber security solutions B)Access controls C)Data Loss Prevention D)Network performance monitoring 44-What does the zero-trust security model emphasize? A)Creating micro-segments around data B)Using only firewalls for protection C)Trusting all users by default D)Limiting access to only IT staff 45- What type of security is used to protect end-user devices like desktops and laptops? A)Endpoint security B)Network Access Control C)Data Loss Prevention D)Identity Access Management 46-Which of the following threats can mobile devices expose businesses to? A)Hardware failures B)Malicious apps C)Increased bandwidth D)Software updates 47-What does IAM stand for in the context of network security? A)Internet Access Management B)Integrated Application Management C)Identity Access Management D)Internal Asset Management 48-What is the primary purpose of mobile security? A)To prevent attacks and secure operating systems B)To increase battery life C)To enhance device performance D)To improve user interface 49-What does Zero Trust security require from users attempting to access network resources? A)Verification from everyone trying to gain access B)Automatic access for trusted users C)Access based on location D)Access based on device type | Page7 50-What does the OSI model help to standardize? A)The speed of data transfer B)The types of devices used in a network C)The different parts required for network communication D)The security protocols for mobile devices 51-The Zero Trust model requires what as a security measure? a) Trust from internal network sources b) Strong passwords only c) Verification from everyone attempting to access the network d) Automatic access for all employees 52- Which layer of the OSI model connects software with hardware? a) Application Layer b) Transport Layer c) Network Layer d) Physical Layer 52- What type of attack involves eavesdropping on transmissions without altering them? a) Active attack b) Passive attack c) Distributed attack d) Hostile attack 53- What does Application Security entail? a) Blocking unauthorized network access b) Developing and testing security features within applications c) Protecting the entire cloud deployment d) Managing user identities 54- What is the primary function of a digital camera? A) To capture and store images and videos in digital format B) To only capture audio C) To print photographs D) To edit videos | Page8 55- Which type of camera is designed for capturing action-packed footage? A) Smartphone camera B) Extreme sport camera C) Digital camera D) Video camcorder 56-What is a unique feature of a drone camera? A) It captures images in low light B) It provides a bird's-eye view C) It is only used for still photography D) It is the most expensive type of camera 57- What is a smartphone camera primarily used for? A) Professional photography B) Capturing everyday scenes and instant sharing C) Only for video recording D) High-resolution images for printing 58- Which of the following is NOT a type of camera mentioned in the document? A) Digital camera B) Smartphone camera C) Film camera D) Special cameras 59-.What is the preferred type of image stabilization for clearer videos? A) Digital Image Stabilization B) Optical Image Stabilization C) Mechanical Image Stabilization D) Software Image Stabilization 60- Which type of image sensor is widely used for its efficiency? A) CCD B) CMOS C) Film D) Digital 61-.What does exposure control allow you to adjust? A) Color balance B) Brightness C) Contrast D) Sharpness | Page9 62- What is the standard resolution for HD video? A) 480p B) 720p C) 1080p D) 2160p 63-What does a higher bit rate indicate in video quality? A) Less detail B) More detail C) No effect D) Lower resolution 64- Which type of zoom maintains image quality by physically extending the lens? A) Digital Zoom B) Optical Zoom C) Hybrid Zoom D) Enhanced Zoom 65- What is the primary advantage of Optical Image Stabilization (OIS) over digital stabilization? A) It is cheaper to implement B) It compensates for camera shake at the lens level C) It requires less power D) It is easier to use 66- Which video format is known for its high compatibility with playback devices? A) AVI B) MKV C) MP4 D) WEBM 67-What is the significance of sensor size in image quality? A) Larger sensors capture less light B) Larger sensors capture more light and detail C) Sensor size has no impact on quality D) Smaller sensors are always better 68- What frame rate is ideal for capturing fast action or creating slow-motion effects? A) 24 fps B) 30 fps C) 60 fps D) 120 fps 69-What are LED panels known for in terms of their lighting capabilities? A. They produce warm, natural-looking light B. They offer adjustable color temperatures C. They create a soft, diffused glow | Page11 70-What type of light is known for emitting a warm, natural-looking light in video production? A. HMI lights (high-intensity discharge) B. Fluorescent video lights (neutral color temperature) C. Tungsten lights 71-What is the primary purpose of using softboxes in video lighting setups? A. To modify and soften the light B. To create harsh shadows and dramatic lighting effects C. To reflect light and increase its intensity for dramatic effects 72-Which lighting option is commonly used for outdoor and daylight scenes due to its powerful daylight-balanced light? A. Tungsten Lights (produce warm light B. Fluorescent Video Lights (energy-efficient but not powerful) C. HMI Lights 73- What is a primary advantage of USB microphones? A.They are only suitable for professionals B.They provide excellent sound quality C.They require additional equipment 74- Who can benefit from using USB microphones? A.Only professional audio engineers B.Only podcasters C.Beginners and professionals 75-What is a key feature of USB microphones? A.They are wireless B.They require a mixer C.They connect directly to a computer 76-What is the primary function of a parabolic microphone? A.To amplify sound B.To filter background noise C.To record distant sounds 77-In what environments are parabolic microphones commonly used? A.Wild recording B.Public speaking events CIndoor studios | Page11 True-or-false 1- Data integrity ensures that data has not been modified, deleted, or tampered with by unauthorized individuals. True False 2- The CIA Triad includes confidentiality, integrity, and availability. True False 3- Data integrity only refers to the accuracy of the data. True False 4- The first cyber security crime occurred in the 21st century. True False 5- Confidentiality in data integrity means the data is protected from unauthorized access. True False 6- In cybersecurity, integrity refers to the assurance that data has not been modified, deleted, or tampered with by unauthorized individuals. True False 7- The CIA Triad consists of confidentiality, integrity, and accountability. True False 8- Data integrity ensures that data is accurate, complete, and trustworthy throughout its entire lifecycle. True False 9- The document states that the biggest cybercrime in history is well-defined and universally agreed upon. True False 10- Confidentiality in data integrity means that the data is protected from unauthorized access. True False 11- Cybersecurity only involves protecting hardware and software, not data. True False | Page12 12- Information security is a subset of cybersecurity. True False 13-Physical security is unrelated to cybersecurity. True False 14-Cybersecurity aims to protect against cyberattacks. True False 15-Cybersecurity only involves protecting hardware and software, not data. True False 16-Information security is a subset of cybersecurity. True False 17-Physical security is unrelated to cybersecurity. True False 18- Cybersecurity aims to protect against cyberattacks. True False 19- The main goal of information security is to maintain the confidentiality, integrity, and availability of data. True False 20- Cybersecurity includes both cybersecurity and physical security. True False 21- Unauthorized access to data centers is a concern of cybersecurity. True False 22- Cybersecurity only applies to internet-connected systems. True False 23- All aspects of cybersecurity are focused solely on software. True False 24- Cybersecurity is essential for protecting against unauthorized access. True False | Page13 25- IoT devices are not susceptible to cyber threats. True False 26- Access is granted by default in a Zero Trust security model. True False 27- The OSI model helps standardize communication across networks by dividing it into multiple layers. True False 28- Application security involves developing features to protect against threats like unauthorized modification. True False 29-SDN technology enables more hardware layers to be implemented through software. True False 30- Network security measures are only designed to protect data after it has been transmitted. True False 31- Cloud security is primarily concerned with protecting physical servers located on- premises. True False 32- Endpoint security is a strategy used to create micro-segments around data whenever it may be. True False 33-Mobile security includes strategies to prevent attacks from mobile devices accessing corporate data. True False 34- Data Loss Prevention (DLP) is a component of endpoint security. True False 35- Internet security measures are irrelevant when it comes to interconnected networks. True False | Page14 36- The seven main pillars of cybersecurity include Mobile Security and IoT Security. True False 37- Zero Trust is an outdated security model that does not apply to modern cybersecurity strategies. True False 38-Does an active attack attempt to learn or make use of information from the system without affecting system resources? True False 39- Are network security solutions designed to identify and block attacks that occur over the network? True False 40- Do threat actors seek out vulnerable IoT devices to use them as pathways into corporate networks? True False 41-A digital camera captures and stores images and videos in analog format. True False 42-Smartphone cameras are great for producing satisfactory images for general use despite their limitations in professional settings. True False 43- Drone cameras are used for capturing perspectives previously reserved for professional cinematographers. True False 44- Extreme sport cameras are designed to be rugged and waterproof. True False 45- A camera can only capture video and not audio. True False 46-Optical Image Stabilization (OIS) is preferred over digital stabilization because it compensates for camera shake at the lens level. True False | Page15 47- CMOS sensors are valued for their high-quality, low-noise images. True False 48- Higher frame rates are ideal for capturing fast action or creating slow-motion effects. True False 49-Digital zoom physically extends the lens to magnify the scene without losing image quality. True False 50-8K resolution delivers exceptionally sharp images with a resolution of 4320p. True False 51- lapel mics are popular used for interview and presentaions True False Fill in the space Application Data link Physical Presentation Network Layer Transport Session | Page16 EWS WS ECU CU MS MCU Answer the following questions 1) During a video production shoot, the crew decides to use LED panels for lighting. They appreciate the energy efficiency and versatility of these lights, especially since they can adjust color temperatures and dim the lights as needed. However, they notice some flickering during recording, which affects the footage quality. How do adjustable color temperatures benefit video production when using LED panels? 2) During a video production shoot, the crew decides to use fluorescent video lights due to their energy efficiency and ability to provide neutral color temperature. They set up softboxes to diffuse the light for an even distribution across the scene. However, they notice that some areas are still harshly lit, creating unwanted shadows. What adjustments can the crew make to improve the lighting setup and reduce harsh shadows in the scene? | Page17