Post-Assessment Chapter 12

Post-Assessment Chapter 12

University

15 Qs

quiz-placeholder

Similar activities

CLC 2021 Virtual Leadership

CLC 2021 Virtual Leadership

University

10 Qs

Good Governance and Social Responsibility

Good Governance and Social Responsibility

University

20 Qs

UTAR Industrial Session

UTAR Industrial Session

University - Professional Development

15 Qs

Quiz 2- Leadership

Quiz 2- Leadership

University

20 Qs

Red Queen

Red Queen

KG - University

10 Qs

IR 4.0 Quiz

IR 4.0 Quiz

University

13 Qs

Quiz Test POL218

Quiz Test POL218

University

20 Qs

Scientific Method

Scientific Method

4th Grade - University

10 Qs

Post-Assessment Chapter 12

Post-Assessment Chapter 12

Assessment

Quiz

Other

University

Hard

Created by

Pat M

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The three fundamental objectives for information includes all of the following, except:

Confidentiality

Integrity

Conformity

Availability

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This technique creates a fraudulent Website to mimic an actual, well-known Website run by another party

Spoofing

Phishing

Spamming

Pharming

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An independent program code that replicates itself and eats away at data, uses up memory, and slows down processing

Viruses

Trojan Horse

DOS

Worm

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Group of people that do politically motivated attacks on publicly accessible Web pages or e-mail servers.

Hackers

Disgruntled Insiders

Criminal Groups

Hacktivism

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The following are the three widely recognized and best practice information security standards, except:

COBIT

ISO/IEC27002

ERP

NIST

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

These applications are computer programs that regularly provide reports in support of decision making and other organization activities.

Order applications

Production applications

Social Media applications

IS applications

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

______ refer to “weakness or exposures in IT assets or processes that may lead to a business risk or a security risk.”

Strengths

Threats

Vulnerabilities

Opportunities

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?