Review: Information Assurance and Security

Review: Information Assurance and Security

University

20 Qs

quiz-placeholder

Similar activities

Cyber Incident Quiz

Cyber Incident Quiz

12th Grade - University

15 Qs

Chapter 1: Introduction to Cyber Security

Chapter 1: Introduction to Cyber Security

University

15 Qs

Week 11 - Stategy & Planning

Week 11 - Stategy & Planning

University

20 Qs

[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

[Pre-Test - BSIT-3A] Fundamental_Concepts_in_IAS

University

15 Qs

Multi Factor Authentication

Multi Factor Authentication

University

20 Qs

Computer Hardware

Computer Hardware

University

20 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

COMPUTING CHAPTER 3-4 part1

COMPUTING CHAPTER 3-4 part1

University

15 Qs

Review: Information Assurance and Security

Review: Information Assurance and Security

Assessment

Quiz

Computers

University

Medium

Created by

Froiland Peñalosa

Used 132+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does 'integrity of data' mean?

"Accuracy and completeness of the data"

"Data should be viewable at all times"

"Data should be access by only the right people"

"None of the above"

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Who you are allowed to give your password to?

"Anybody you trust"

"Only supervisors and authorised IT staff if requested"

"Only IT staff"

"Nobody"

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which security principles are covered by the CIA triad?

certified, integrated, accessible

continuity, integrity, accessibility

confidentiality, integrity, availability

confidentiality, installation, assembly

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does a keylogger do?

provides

prevents certain data from being entered

encrypts data entered with a keyboard

tracks a user's keystrokes on the keyboard

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this.

Information Technology

Information Security

Information System

Information

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Consent is required prior to the collection

of all personal data.

true

false

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

is a weakness in the security system (for example, in procedures, design, or implementation), that might be exploited to cause loss or harm.

vulnerability

threat

attack

control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?