CO2521 Recap Week 09

CO2521 Recap Week 09

University

22 Qs

quiz-placeholder

Similar activities

Principles of Security

Principles of Security

University

20 Qs

Quiz on Lesson 6: Database Design

Quiz on Lesson 6: Database Design

University

20 Qs

Unit 3: Security & Legal Aspects of Technology

Unit 3: Security & Legal Aspects of Technology

University

21 Qs

Database Management Systems

Database Management Systems

University

19 Qs

Network Security

Network Security

University

20 Qs

Computer Security Measures

Computer Security Measures

12th Grade - University

19 Qs

Review: Information Assurance and Security

Review: Information Assurance and Security

University

20 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

CO2521 Recap Week 09

CO2521 Recap Week 09

Assessment

Quiz

Computers

University

Medium

Created by

Christopher Finnigan

Used 6+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information Security often refers to the CIA Triad, what does the 'C' stand for?

Conservation

Complexity

Confidentiality

Checkguard

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information Security often refers to the CIA Triad, what does the 'A' stand for?

Authentication

Authority

Availability

Access

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which part of the CIA Triad ensures that information is present at the time when authorized parties require it.

Authorisation

Authentication

Confidentiality

Availalibility

4.

DRAG AND DROP QUESTION

1 min • 5 pts

​ ​ (a)   is an example of physical asset

The web server
The web pages
network traffic
the user data

5.

DRAG AND DROP QUESTION

1 min • 5 pts

​ ​ (a)   is the Intentional or unintentional act that causes damage/compromise information or systems

Attack
Exploit
Loss
Threat

6.

DRAG AND DROP QUESTION

1 min • 5 pts

​ ​ (a)   action that has the potential to adversely affect operations and assets.

Threat
Attack
Exploit
Loss

7.

DROPDOWN QUESTION

1 min • 5 pts

​ (a)   is the probability that a ​ (b)   will be exploited

Risk
Vulnerability
Threat
Malware
Report
Loss

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?