
Principles of Security
Computers
University
Used 179+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does CIA stand for?
Confidence, Integrity, Accountability
Confidentiality, Integrity, Availability
Configuration, Information, Acceptance
Countermeasure, Intrusion, Access
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Passwords are what type of control?
Preventive
Detective
Corrective
Deterrent
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Risk management is the process of identifying, assessing, and reducing the risk to an acceptable level and implementing the right mechanisms to maintain that level of risk.
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Who bears ultimate responsibility for the protection of assets within the organization?
Data owners
Stakeholders
Senior management
Security professionals
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT addressed by the data retention policy?
What data to keep
For whom data is kept
How long data is kept
Where data is kept
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Water detectors can help prevent damage to:
Equipment
Flooring
Computers
All of the above
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Location of water detectors should be:
Under raised floors
On dropped ceilings
Both
Neither
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?