ISSD Topic 2

ISSD Topic 2

Professional Development

15 Qs

quiz-placeholder

Similar activities

Digital Electronics (Weekend Assignment - 3)

Digital Electronics (Weekend Assignment - 3)

University - Professional Development

20 Qs

POST TEST WEB STATIC

POST TEST WEB STATIC

University - Professional Development

20 Qs

Cyber Resilience Training

Cyber Resilience Training

Professional Development

16 Qs

IoT

IoT

KG - Professional Development

11 Qs

How Well Do You Them?

How Well Do You Them?

Professional Development

10 Qs

Deci- Session 1- Time Machine

Deci- Session 1- Time Machine

Professional Development

12 Qs

Microsoft 365

Microsoft 365

Professional Development

10 Qs

Telco Practice Test 1

Telco Practice Test 1

Professional Development

15 Qs

ISSD Topic 2

ISSD Topic 2

Assessment

Quiz

Computers

Professional Development

Practice Problem

Medium

Created by

Michael Tan

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A group of hardware and software components that work together to perform a useful task is called a ____.

system

portal

operating system

device

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Identify the design process to integrate security systems.

(Hint: Select 4 options)

Establish security obejctives

Establish security policies

Determine budgets

Document design basis

Server hardening

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Identify the design process to integrate security systems.

(Hint: Select 3 options)

Conduct research

Develop drawings and specify resources

Considerations in research phase

Determine IT systems

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The protective activities required to prevent unauthorized entry or use of classified or controlled information is called ____.

security countermeasures

document management system

system authentication

incident management

5.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Identify 3 categories of countermeasures.

High technology (Electronic security system)

Low technology (Locks and barriers)

No technology (Policies and procedures)

System integration (Centralized access control)

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

When establishing security countermeasures policies, these will involve ____.

(Hint: Select 3 options)

Personnel

Hardware

Software

Weapons

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Identify 3 security budget dimensions.

Countermeasure determination

Prioritization

Phasing

Assets

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?