
Review: Information Assurance and Security
Authored by Froiland Peñalosa
Computers
University
Used 134+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What does 'integrity of data' mean?
"Accuracy and completeness of the data"
"Data should be viewable at all times"
"Data should be access by only the right people"
"None of the above"
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Who you are allowed to give your password to?
"Anybody you trust"
"Only supervisors and authorised IT staff if requested"
"Only IT staff"
"Nobody"
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which security principles are covered by the CIA triad?
certified, integrated, accessible
continuity, integrity, accessibility
confidentiality, integrity, availability
confidentiality, installation, assembly
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What does a keylogger do?
provides
prevents certain data from being entered
encrypts data entered with a keyboard
tracks a user's keystrokes on the keyboard
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
The state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this.
Information Technology
Information Security
Information System
Information
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Consent is required prior to the collection
of all personal data.
true
false
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
is a weakness in the security system (for example, in procedures, design, or implementation), that might be exploited to cause loss or harm.
vulnerability
threat
attack
control
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?