
Lesson 2: Information Assurance Principles
Presentation
•
Computers
•
University
•
Easy
Lorie undefined
Used 1+ times
FREE Resource
17 Slides • 19 Questions
1
2
3
Multiple Choice
Which of the following does Information Assurance cover?
Only technology
People, processes, and technology
Only people
Only processes
4
Open Ended
Why is it important for information to be trustworthy, secure, and reliable in today's digital world?
5
6
Multiple Choice
Which of the following is NOT included in the scope of information assurance?
Technical controls
Administrative controls
Legal controls
Physical fitness
7
8
Multiple Select
Which of the following are objectives of information assurance?
Protect sensitive data
Ensure data accuracy
Maintain system availability
Increase marketing reach
9
Open Ended
How do the objectives of information assurance support both technical and ethical requirements?
10
11
12
Fill in the Blanks
Type answer...
13
14
Multiple Select
Which of the following are key concepts related to integrity in information assurance?
Hashing and checksums
Encryption
Digital signatures
Version control
15
16
Open Ended
Explain how redundancy and backups contribute to the availability principle in information assurance.
17
18
19
Multiple Choice
Which of the following is an example of authentication?
Passwords and PINs
Audit logs
Digital signatures
Viewing grades
20
21
Multiple Choice
How does authorization differ from authentication?
Authorization verifies identity, authentication determines actions allowed.
Authentication determines actions allowed, authorization verifies identity.
Authentication verifies identity, authorization determines actions allowed.
Both are the same process.
22
23
Open Ended
List two key tools used to ensure accountability in information assurance.
24
25
Fill in the Blanks
Type answer...
26
27
Open Ended
Explain the main difference in focus between Information Assurance and Information Security.
28
Multiple Choice
Which aspects are included in Information Assurance but not in Information Security?
Policies, laws, people, technology
Mainly technical controls
Protection mechanisms
Technical and focused
29
30
Multiple Choice
Which of the following is NOT a threat addressed by Information Assurance?
Cyber attacks
Natural disasters
System failures
Market competition
31
32
Fill in the Blanks
Type answer...
33
34
Open Ended
Explain how Information Assurance contributes to both organizational reputation and operational success, referencing the principles and benefits discussed.
35
Multiple Choice
Which of the following is NOT covered by Information Assurance?
People
Processes
Technology
Weather
36
Open Ended
Summarize one key takeaway you learned about Information Assurance from today's lesson.
Show answer
Auto Play
Slide 1 / 36
SLIDE
Similar Resources on Wayground
27 questions
Introduction to Multimedia
Presentation
•
University
30 questions
Viruses
Presentation
•
12th Grade
26 questions
PL/SQL
Presentation
•
University
31 questions
Dual Credit Government lesson
Presentation
•
University
32 questions
Business Model Canvas
Presentation
•
University
33 questions
ITT Webinar Primary (2021): Post Session feedback Form Ops
Presentation
•
Professional Development
31 questions
Intonation (Lecture)
Presentation
•
University
33 questions
PhDMicroscopy
Presentation
•
University
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade