Exercise: Information and Computer Security

Exercise: Information and Computer Security

Professional Development

8 Qs

quiz-placeholder

Similar activities

Deputy PST

Deputy PST

Professional Development

10 Qs

HEM Chapter 4

HEM Chapter 4

Professional Development

8 Qs

AMS – ISF – ENS – CCAM – ACI - TEST MỞ ĐẦU

AMS – ISF – ENS – CCAM – ACI - TEST MỞ ĐẦU

Professional Development

10 Qs

Lesson 1-4 Review

Lesson 1-4 Review

Professional Development

12 Qs

HEM Chapter 1

HEM Chapter 1

Professional Development

10 Qs

TE- POST TEST @ 19/8/2020

TE- POST TEST @ 19/8/2020

Professional Development

10 Qs

QUIZ ISS

QUIZ ISS

Professional Development

10 Qs

Viral Cytotoxicity

Viral Cytotoxicity

University - Professional Development

11 Qs

Exercise: Information and Computer Security

Exercise: Information and Computer Security

Assessment

Quiz

Other

Professional Development

Hard

Created by

RID RID

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sensitive information assets at nuclear facilities include:

Details of physical security systems, personnel systems and plans

Details on type, quantity, quality, and location of nuclear and other radioactive materials housed at the facility

Transport information, schedules, and security for the movement of nuclear materials

All above are true

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three principle of information security?

Confidentiality, information, alert

Confidentiality, Integration, attack prevention

Confidentiality, integrity, availability

Consistency, integrity, alert

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following computer security controls describes :

Policy, procedures and practices designed to protect computer systems through personnel behaviors. These are directive in nature specifying what employees should and should not do.

Administrative controls

Physical controls

Technical controls

Legal controls

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following steps are not mention in Implementing Information Security using Graded approach

Identification of sensitive information and assets

Identification of compromise impact/risk

Designation senior management’s to create a computer security programme

Designation of appropriate information security measures

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Computer Security programme is focused on preventing computer acts that could directly or indirectly lead to:

1. unauthorized removal of nuclear/other radioactive material

2. Data breaching of nuclear unclassified information

3. sabotage against nuclear material or nuclear facilities

4. theft of nuclear sensitive information

The correct statement are:

1,2,3

1,2,4

1,3,4

2,3,4

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person or group of persons with motivation, intention and capability to commit a malicious act and actually attempting such an act, is called :

threat

adversary

hacker

Terrorists

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A reconnaissance is the efforts to collect as much information as possible before launching cyber attacks. Which of step in attack-chain does the reconnaissance referred to?

Engagement

Preparation

Presence

Compromise

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The following are examples of OT in Physical Protection System (PPS), except:

Explosive Detection

Turbine Control

Access Control

Video Surveillance