ECIH QUIZ

ECIH QUIZ

KG - 5th Grade

50 Qs

quiz-placeholder

Similar activities

UH BAB 1 DAN BAB 2 INFORMATIKA KELAS 10

UH BAB 1 DAN BAB 2 INFORMATIKA KELAS 10

10th Grade

50 Qs

BASISDATA RPL

BASISDATA RPL

12th Grade

50 Qs

LATIHAN ULANGAN SEMESTER 1 KELAS 8

LATIHAN ULANGAN SEMESTER 1 KELAS 8

8th Grade

50 Qs

object oriented analysis and design test2

object oriented analysis and design test2

University

50 Qs

Module 11

Module 11

University

51 Qs

SIMULASI DIGITAL

SIMULASI DIGITAL

5th Grade

50 Qs

MID Etika profesi TI

MID Etika profesi TI

5th Grade

52 Qs

Unit 3 - Connections

Unit 3 - Connections

1st Grade

50 Qs

ECIH QUIZ

ECIH QUIZ

Assessment

Quiz

Computers

KG - 5th Grade

Hard

Created by

Marsha Defenxor

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Computer security incident can be defined as:

Rectifying loss of information that may affect the investment of organization in different business activities

Events related to physical security incidents and trouble--- shooting issues in corporate networks

Any real or suspected adverse event in relation to the security of computer systems or networks

Policies guaranteeing access to information system resources

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Data classification is the process of classifying data based on the level of sensitivity as it is created, modified, improved, stored, or transmitted. Which of

these levels fall into U.S. Government standards for data classification?

Top secret

All answer is correct

Confidential

Restricted

Unclassified

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

"Technically not a U.S. Government classification level, but used for government documents that do not have a classification. Such documents can sometimes be viewed by those without security clearance”. Which of the following items correctly

describes the above statement?

Top secret

Unclassified

Confidential

Restricted

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Information Warfare refers to the use of information and information systems as weapons in a conflict in which the information and information systems themselves are the targets. Which of these constitute the categories of information warfare?

Offensive information warfare

Employee sabotage information warfare

Defensive information warfare

Organization’s breach information warfare

Offensive and Defensive information warfare

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Information system processes data into useful information to achieve specified organizational or individual goals. It accepts, processes, and stores data in the form of records in a computer system and automates some of the information processing activities of the organization.

Who is responsible for implementing and controlling the security measures of an information system?

Information custodian

Information consultant

Information owner

Information implementer

Information gatherer

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Identify the three tenets of information security.

Confidentiality

Integrity

Availability

Non---Repudiation

authorization

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which out of these signs do not indicate a computer security incident?

A system alarm or similar indication from an intrusion---detection

Attempt to logon to a new user account

Smoke emitting from the system

System crashes or poor system performance

Unauthorized operation of a program or sniffer device to capture network traffic

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?