ECIH QUIZ

ECIH QUIZ

KG - 5th Grade

50 Qs

quiz-placeholder

Similar activities

Sec+ Day 7

Sec+ Day 7

12th Grade - University

50 Qs

ITF+ 6.1 to 6.4  Security Concepts

ITF+ 6.1 to 6.4 Security Concepts

12th Grade

50 Qs

Studio - U3 - LO4-4.1 Responding to an incident

Studio - U3 - LO4-4.1 Responding to an incident

12th Grade

54 Qs

Practice Exam 1

Practice Exam 1

Professional Development

50 Qs

Security+ Incident Response and Computer Forensics

Security+ Incident Response and Computer Forensics

Professional Development

45 Qs

CySA+ (151-200)

CySA+ (151-200)

KG

49 Qs

IT Fundamentals Test Part 1

IT Fundamentals Test Part 1

KG - University

49 Qs

SC-900 Day 3

SC-900 Day 3

Professional Development

50 Qs

ECIH QUIZ

ECIH QUIZ

Assessment

Quiz

Computers

KG - 5th Grade

Hard

Created by

Marsha Defenxor

Used 11+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Computer security incident can be defined as:

Rectifying loss of information that may affect the investment of organization in different business activities

Events related to physical security incidents and trouble--- shooting issues in corporate networks

Any real or suspected adverse event in relation to the security of computer systems or networks

Policies guaranteeing access to information system resources

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Data classification is the process of classifying data based on the level of sensitivity as it is created, modified, improved, stored, or transmitted. Which of

these levels fall into U.S. Government standards for data classification?

Top secret

All answer is correct

Confidential

Restricted

Unclassified

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

"Technically not a U.S. Government classification level, but used for government documents that do not have a classification. Such documents can sometimes be viewed by those without security clearance”. Which of the following items correctly

describes the above statement?

Top secret

Unclassified

Confidential

Restricted

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Information Warfare refers to the use of information and information systems as weapons in a conflict in which the information and information systems themselves are the targets. Which of these constitute the categories of information warfare?

Offensive information warfare

Employee sabotage information warfare

Defensive information warfare

Organization’s breach information warfare

Offensive and Defensive information warfare

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Information system processes data into useful information to achieve specified organizational or individual goals. It accepts, processes, and stores data in the form of records in a computer system and automates some of the information processing activities of the organization.

Who is responsible for implementing and controlling the security measures of an information system?

Information custodian

Information consultant

Information owner

Information implementer

Information gatherer

6.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Identify the three tenets of information security.

Confidentiality

Integrity

Availability

Non---Repudiation

authorization

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which out of these signs do not indicate a computer security incident?

A system alarm or similar indication from an intrusion---detection

Attempt to logon to a new user account

Smoke emitting from the system

System crashes or poor system performance

Unauthorized operation of a program or sniffer device to capture network traffic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?