Information Security Fundamentals

Information Security Fundamentals

11th Grade

60 Qs

quiz-placeholder

Similar activities

Data Security & Ethics

Data Security & Ethics

9th - 12th Grade

56 Qs

OCR A-Level Computer Science 1.5.1 Computer Related Legislation

OCR A-Level Computer Science 1.5.1 Computer Related Legislation

11th - 12th Grade

65 Qs

IT for life

IT for life

KG - University

55 Qs

Asesmen Keamanan Data

Asesmen Keamanan Data

9th Grade - University

65 Qs

REMIDI PAS GANJIL SISTEM KEAMANAN JARINGAN

REMIDI PAS GANJIL SISTEM KEAMANAN JARINGAN

11th Grade

55 Qs

Reti internet e sicurezza in rete

Reti internet e sicurezza in rete

11th Grade

61 Qs

Malware Threats Quiz

Malware Threats Quiz

11th Grade

57 Qs

Safety and Security - Easy

Safety and Security - Easy

7th Grade - University

57 Qs

Information Security Fundamentals

Information Security Fundamentals

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Angelina CTA]

Used 31+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which element of the CIA triad deals with ensuring users only access files they need to do their job?

Authorization

Integrity

Availability

Confidentiality

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

If a file has been altered without permission or knowledge, this violates the principle of ____.

encryption

integrity

least privilege

confidentiality

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What process prevents a user from denying they made changes to a file?

Encryption

Permissions

Nonrepudiation

Secure passwords

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following helps provide confidentiality to data?

A secure password

Encryption

Nonrepudiation

Antimalware

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which security principle is violated by an attack in which users are unable to access their files?

Availability

Principle of least privilege

Integrity

Nonrepudiation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which security technique is provided by using multiple levels of protection, such as firewalls, antimalware software, and strong password policies?

Integrity

Nonrepudiation

Defense in depth

Principle of least privilege

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following security domains represents the weakest link in the security chain?

Workstation

User

System

LAN

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?