Exercise: Information and Computer Security

Exercise: Information and Computer Security

Professional Development

8 Qs

quiz-placeholder

Similar activities

Week 1_Post-Training

Week 1_Post-Training

Professional Development

10 Qs

Weekly Quiz 1

Weekly Quiz 1

4th Grade - Professional Development

10 Qs

Security Awareness Level 4

Security Awareness Level 4

Professional Development

10 Qs

No PED I Health

No PED I Health

Professional Development

10 Qs

NCLEX FGD

NCLEX FGD

Professional Development

10 Qs

IOS vocabulary

IOS vocabulary

Professional Development

10 Qs

I&S : IB Command Terms

I&S : IB Command Terms

5th Grade - Professional Development

8 Qs

ESAFS_090822

ESAFS_090822

Professional Development

10 Qs

Exercise: Information and Computer Security

Exercise: Information and Computer Security

Assessment

Quiz

Other

Professional Development

Hard

Created by

RID RID

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sensitive information assets at nuclear facilities include:

Details of physical security systems, personnel systems and plans

Details on type, quantity, quality, and location of nuclear and other radioactive materials housed at the facility

Transport information, schedules, and security for the movement of nuclear materials

All above are true

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three principle of information security?

Confidentiality, information, alert

Confidentiality, Integration, attack prevention

Confidentiality, integrity, availability

Consistency, integrity, alert

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following computer security controls describes :

Policy, procedures and practices designed to protect computer systems through personnel behaviors. These are directive in nature specifying what employees should and should not do.

Administrative controls

Physical controls

Technical controls

Legal controls

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following steps are not mention in Implementing Information Security using Graded approach

Identification of sensitive information and assets

Identification of compromise impact/risk

Designation senior management’s to create a computer security programme

Designation of appropriate information security measures

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Computer Security programme is focused on preventing computer acts that could directly or indirectly lead to:

1. unauthorized removal of nuclear/other radioactive material

2. Data breaching of nuclear unclassified information

3. sabotage against nuclear material or nuclear facilities

4. theft of nuclear sensitive information

The correct statement are:

1,2,3

1,2,4

1,3,4

2,3,4

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person or group of persons with motivation, intention and capability to commit a malicious act and actually attempting such an act, is called :

threat

adversary

hacker

Terrorists

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A reconnaissance is the efforts to collect as much information as possible before launching cyber attacks. Which of step in attack-chain does the reconnaissance referred to?

Engagement

Preparation

Presence

Compromise

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following are examples of OT in Physical Protection System (PPS), except:

Explosive Detection

Turbine Control

Access Control

Video Surveillance