
ECIH QUIZ

Quiz
•
Computers
•
KG - 5th Grade
•
Hard

Marsha Defenxor
Used 11+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Computer security incident can be defined as:
Rectifying loss of information that may affect the investment of organization in different business activities
Events related to physical security incidents and trouble--- shooting issues in corporate networks
Any real or suspected adverse event in relation to the security of computer systems or networks
Policies guaranteeing access to information system resources
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Data classification is the process of classifying data based on the level of sensitivity as it is created, modified, improved, stored, or transmitted. Which of
these levels fall into U.S. Government standards for data classification?
Top secret
All answer is correct
Confidential
Restricted
Unclassified
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
"Technically not a U.S. Government classification level, but used for government documents that do not have a classification. Such documents can sometimes be viewed by those without security clearance”. Which of the following items correctly
describes the above statement?
Top secret
Unclassified
Confidential
Restricted
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Information Warfare refers to the use of information and information systems as weapons in a conflict in which the information and information systems themselves are the targets. Which of these constitute the categories of information warfare?
Offensive information warfare
Employee sabotage information warfare
Defensive information warfare
Organization’s breach information warfare
Offensive and Defensive information warfare
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Information system processes data into useful information to achieve specified organizational or individual goals. It accepts, processes, and stores data in the form of records in a computer system and automates some of the information processing activities of the organization.
Who is responsible for implementing and controlling the security measures of an information system?
Information custodian
Information consultant
Information owner
Information implementer
Information gatherer
6.
MULTIPLE SELECT QUESTION
1 min • 1 pt
Identify the three tenets of information security.
Confidentiality
Integrity
Availability
Non---Repudiation
authorization
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which out of these signs do not indicate a computer security incident?
A system alarm or similar indication from an intrusion---detection
Attempt to logon to a new user account
Smoke emitting from the system
System crashes or poor system performance
Unauthorized operation of a program or sniffer device to capture network traffic
Create a free account and access millions of resources
Similar Resources on Wayground
50 questions
CSS- 3rd Quarterly Assessment

Quiz
•
12th Grade
50 questions
AHJ: U6 Data Privacy and Security

Quiz
•
12th Grade - University
45 questions
Cybersecurity Intro

Quiz
•
University
48 questions
CYSA + (251-300)

Quiz
•
KG
50 questions
CySA+ (51-100)

Quiz
•
KG
48 questions
ESB Domain 1 Lesson 1

Quiz
•
10th - 12th Grade
50 questions
CSS10

Quiz
•
10th Grade
50 questions
Introduction to Business & Technology Final Exam Review

Quiz
•
8th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade