Information Security Fundamentals

Information Security Fundamentals

11th Grade

60 Qs

quiz-placeholder

Similar activities

Computer Science AQA A-Level Paper 2 Practice

Computer Science AQA A-Level Paper 2 Practice

11th - 12th Grade

55 Qs

Preparing for MTA Certification

Preparing for MTA Certification

KG - University

60 Qs

Ақпараттық қауіпсіздік информатика

Ақпараттық қауіпсіздік информатика

11th Grade

61 Qs

Soal kocak Aku

Soal kocak Aku

11th Grade

61 Qs

GCSE Computer Science - Computer Systems

GCSE Computer Science - Computer Systems

10th - 11th Grade

63 Qs

SMK Binaiswa 02 Cililin

SMK Binaiswa 02 Cililin

11th Grade - University

55 Qs

Photoshop (Quiz2)

Photoshop (Quiz2)

11th Grade

60 Qs

Ulangkaji ASK T1 Bab 2.2 Ukuran Data

Ulangkaji ASK T1 Bab 2.2 Ukuran Data

1st - 12th Grade

57 Qs

Information Security Fundamentals

Information Security Fundamentals

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Angelina CTA]

Used 31+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which element of the CIA triad deals with ensuring users only access files they need to do their job?

Authorization

Integrity

Availability

Confidentiality

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

If a file has been altered without permission or knowledge, this violates the principle of ____.

encryption

integrity

least privilege

confidentiality

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What process prevents a user from denying they made changes to a file?

Encryption

Permissions

Nonrepudiation

Secure passwords

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following helps provide confidentiality to data?

A secure password

Encryption

Nonrepudiation

Antimalware

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which security principle is violated by an attack in which users are unable to access their files?

Availability

Principle of least privilege

Integrity

Nonrepudiation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which security technique is provided by using multiple levels of protection, such as firewalls, antimalware software, and strong password policies?

Integrity

Nonrepudiation

Defense in depth

Principle of least privilege

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following security domains represents the weakest link in the security chain?

Workstation

User

System

LAN

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?