The CIA triad is a prominent information security model defining which three central aspects of information security?
ISYS3439 - Cyber GRC

Quiz
•
Other
•
University
•
Hard

Nebs P
Used 10+ times
FREE Resource
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Confidentiality, integrity, and accountability
Classification, integrity, and accountability
Confidentiality, identity, and accessibility
Confidentiality, integrity, and availability
2.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
Which of vulnerability, threat, and risk would be assessed by likelihood and impact?
Vulnerability
Threat
Risk
All 3
3.
MULTIPLE CHOICE QUESTION
20 sec • 5 pts
What are the 5 major stages of the NIST CSF?
Identify, Protect, Detect, Respond, Recover
Identify, Prevent, Detect, Respond, Recover
Identify, Protect, Deflect, Respond, Recover
Identify, Protect, Detect, Respond, Return
4.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
Control diversity means:
That the layers of controls should combine different classes of technical and administrative controls with the range of control types
That the layers of controls should combine different classes of technical and physical controls with the range of control types
That the layers of controls should combine different classes of physical and administrative controls with the range of control types
That the layers of controls should combine different classes of technical, administrative and physical controls with the range of control types
5.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
Choose the option that best describes the concept of least privilege:
For a critical business function to be secure, it may be necessary to ensure that no one person can perform that function
A basic principle of security stating that something should be allocated the minimum necessary rights, privileges, or information to perform its role
Enforcing a security role by separating it from the network or access by the rest of the network
Screening new employees through background checks, ensuring employees are set up with the correct privileges when they join or change job roles, and ensuring that privileges are revoked if the employee is fired or retires
6.
MULTIPLE CHOICE QUESTION
45 sec • 5 pts
A security policy:
Defines the scope of security needed by the organisation and discusses the assets that require protection and the extent to which security solutions should go to provide the necessary protection
Is a set sequence of necessary activities that performs a specific security task or function
Provides practical guidance on how an organisation can protect their systems and data from cyber threats
Defines a minimum level of security that every system throughout the organisation must meet
7.
MULTIPLE SELECT QUESTION
20 sec • 5 pts
Which of the following is free? (Multiple answers may apply)
ISO 27001
NIST CSF
COBIT
ITIL
Create a free account and access millions of resources
Similar Resources on Quizizz
25 questions
AIRLINE RAMP CONTROL REVISION QUIZ 2

Quiz
•
University
22 questions
CHAP 3

Quiz
•
University
25 questions
Preventive Cybersecurity Quiz

Quiz
•
12th Grade - University
21 questions
Higher AIT - Workplace Legislation

Quiz
•
5th Grade - University
21 questions
Quiz 2 - Hybrid Project Management

Quiz
•
University
24 questions
2p-BIS & OECD-Int.Org._2024

Quiz
•
University
23 questions
Marketing Management

Quiz
•
University
21 questions
IT Audit and Control

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade