Post-Assessment Chapter 12

Post-Assessment Chapter 12

University

15 Qs

quiz-placeholder

Similar activities

CNCF Landscape

CNCF Landscape

University

13 Qs

OBM247 - EXERCISE CHAPTER 3 (MCQ)

OBM247 - EXERCISE CHAPTER 3 (MCQ)

University

20 Qs

CDP- Session 7

CDP- Session 7

University

14 Qs

CyberWarfare and India's take on it

CyberWarfare and India's take on it

University

10 Qs

HIPAA Compliance

HIPAA Compliance

University - Professional Development

18 Qs

Achieving Quality Production

Achieving Quality Production

10th Grade - University

15 Qs

Cybersecurity Terminology Quiz

Cybersecurity Terminology Quiz

University

20 Qs

Industrial Security

Industrial Security

University

10 Qs

Post-Assessment Chapter 12

Post-Assessment Chapter 12

Assessment

Quiz

Other

University

Hard

Created by

Pat M

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The three fundamental objectives for information includes all of the following, except:

Confidentiality

Integrity

Conformity

Availability

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This technique creates a fraudulent Website to mimic an actual, well-known Website run by another party

Spoofing

Phishing

Spamming

Pharming

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An independent program code that replicates itself and eats away at data, uses up memory, and slows down processing

Viruses

Trojan Horse

DOS

Worm

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Group of people that do politically motivated attacks on publicly accessible Web pages or e-mail servers.

Hackers

Disgruntled Insiders

Criminal Groups

Hacktivism

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The following are the three widely recognized and best practice information security standards, except:

COBIT

ISO/IEC27002

ERP

NIST

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

These applications are computer programs that regularly provide reports in support of decision making and other organization activities.

Order applications

Production applications

Social Media applications

IS applications

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

______ refer to “weakness or exposures in IT assets or processes that may lead to a business risk or a security risk.”

Strengths

Threats

Vulnerabilities

Opportunities

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?