Search Header Logo

Exercise: Information and Computer Security

Authored by RID RID

Other

Professional Development

Used 1+ times

Exercise: Information and Computer Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sensitive information assets at nuclear facilities include:

Details of physical security systems, personnel systems and plans

Details on type, quantity, quality, and location of nuclear and other radioactive materials housed at the facility

Transport information, schedules, and security for the movement of nuclear materials

All above are true

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three principle of information security?

Confidentiality, information, alert

Confidentiality, Integration, attack prevention

Confidentiality, integrity, availability

Consistency, integrity, alert

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following computer security controls describes :

Policy, procedures and practices designed to protect computer systems through personnel behaviors. These are directive in nature specifying what employees should and should not do.

Administrative controls

Physical controls

Technical controls

Legal controls

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following steps are not mention in Implementing Information Security using Graded approach

Identification of sensitive information and assets

Identification of compromise impact/risk

Designation senior management’s to create a computer security programme

Designation of appropriate information security measures

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Computer Security programme is focused on preventing computer acts that could directly or indirectly lead to:

1. unauthorized removal of nuclear/other radioactive material

2. Data breaching of nuclear unclassified information

3. sabotage against nuclear material or nuclear facilities

4. theft of nuclear sensitive information

The correct statement are:

1,2,3

1,2,4

1,3,4

2,3,4

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person or group of persons with motivation, intention and capability to commit a malicious act and actually attempting such an act, is called :

threat

adversary

hacker

Terrorists

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A reconnaissance is the efforts to collect as much information as possible before launching cyber attacks. Which of step in attack-chain does the reconnaissance referred to?

Engagement

Preparation

Presence

Compromise

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?