Chapter 1

Chapter 1

University

10 Qs

quiz-placeholder

Similar activities

SEGURIDAD DE LA INFORMACION

SEGURIDAD DE LA INFORMACION

University

10 Qs

CHAPTER 1: COMPUTER SECURITY REVIEW

CHAPTER 1: COMPUTER SECURITY REVIEW

University

10 Qs

CLOUD COMPUTING: ACTIVITY 3

CLOUD COMPUTING: ACTIVITY 3

University

10 Qs

Chapter 2 Testing Throughout the SDLC

Chapter 2 Testing Throughout the SDLC

University

9 Qs

Quiz Rolling Vol.8

Quiz Rolling Vol.8

10th Grade - University

10 Qs

POP QUIZ 4 (DFC40243)

POP QUIZ 4 (DFC40243)

University

10 Qs

21CSC305P - Machnine Learning - Quiz

21CSC305P - Machnine Learning - Quiz

University

15 Qs

AIJ (Memahami Fairewall)

AIJ (Memahami Fairewall)

University

10 Qs

Chapter 1

Chapter 1

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

SYAKIRA WAHAB

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Manages daily operations of security technology

Chief information security officer

Security manager

Security administrator

Security technician

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Security is the goal to be free from danger as well as the process that achieves that freedom

True

False

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The less secure something is, the less convenient it may become to use

False

True

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

The information cannot be “locked up” so tight that

no one can access it

Integrity

Availability

Confidentiality

Authorization

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Only approved individuals are able to access

important information

Authorization

Accounting

Integrity

Confidentiality

6.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

Information and the hardware, software, and communications are protected in three layers. List three layer below

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

They cannot easily be replaced without a significant investment in expense, time, worker skill, and/or resources

Asset

Threat agent

Threat

Vulnerability

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers