ISSD Topic 2

ISSD Topic 2

Professional Development

15 Qs

quiz-placeholder

Similar activities

Security Issues Of Memory Management In Modern Operating Systems

Security Issues Of Memory Management In Modern Operating Systems

Professional Development

10 Qs

DECI - Week 10 - round

DECI - Week 10 - round

Professional Development

13 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

IT General Control

IT General Control

Professional Development

10 Qs

Level 5 - OSP Quiz

Level 5 - OSP Quiz

Professional Development

15 Qs

City & Guilds Level 3 Apprenticeship Coding and Logic

City & Guilds Level 3 Apprenticeship Coding and Logic

Professional Development

20 Qs

Sec+ Quiz - 2

Sec+ Quiz - 2

Professional Development

15 Qs

Linux Managing Systems

Linux Managing Systems

Professional Development

20 Qs

ISSD Topic 2

ISSD Topic 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Michael Tan

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A group of hardware and software components that work together to perform a useful task is called a ____.

system

portal

operating system

device

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Identify the design process to integrate security systems.

(Hint: Select 4 options)

Establish security obejctives

Establish security policies

Determine budgets

Document design basis

Server hardening

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Identify the design process to integrate security systems.

(Hint: Select 3 options)

Conduct research

Develop drawings and specify resources

Considerations in research phase

Determine IT systems

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The protective activities required to prevent unauthorized entry or use of classified or controlled information is called ____.

security countermeasures

document management system

system authentication

incident management

5.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Identify 3 categories of countermeasures.

High technology (Electronic security system)

Low technology (Locks and barriers)

No technology (Policies and procedures)

System integration (Centralized access control)

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

When establishing security countermeasures policies, these will involve ____.

(Hint: Select 3 options)

Personnel

Hardware

Software

Weapons

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Identify 3 security budget dimensions.

Countermeasure determination

Prioritization

Phasing

Assets

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?