Information Security Flashcard 2

Information Security Flashcard 2

Assessment

Flashcard

Computers

12th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

10 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which of the following is NOT a component of the CIA triad in Information Security? Confidentiality, Availability, Integrity, Authorization

Back

Authorization

2.

FLASHCARD QUESTION

Front

Which of the following tools is primarily used to ensure confidentiality? Encryption, Hashing, Backups, Digital signatures

Back

Encryption

3.

FLASHCARD QUESTION

Front

Which type of attack directly impacts the availability of a system? Options: Phishing, DDoS, Ransomware, Man-in-the-middle

Back

DDoS

4.

FLASHCARD QUESTION

Front

What is the primary goal of an Advanced Persistent Threat (APT)?

Back

Steal sensitive data over time without detection

5.

FLASHCARD QUESTION

Front

Which of the following is an example of protecting data integrity? Options: Using multi-factor authentication, Encrypting sensitive documents, Running regular backups, Applying checksums to verify data accuracy

Back

Applying checksums to verify data accuracy

6.

FLASHCARD QUESTION

Front

Which cyber threat is characterized by an attacker pretending to be a trusted entity to trick individuals into revealing sensitive information?

Back

Phishing

7.

FLASHCARD QUESTION

Front

In the context of the document, what does 'Availability' refer to?

Back

Ensuring that systems and data are accessible to authorized users when needed

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?