ISC2 - Chapter 1 - Module 1 - G2

ISC2 - Chapter 1 - Module 1 - G2

Professional Development

15 Qs

quiz-placeholder

Similar activities

Encryption

Encryption

Professional Development

15 Qs

The Worst IT Quiz Ever

The Worst IT Quiz Ever

Professional Development

15 Qs

Linkedin CyberSec Test

Linkedin CyberSec Test

Professional Development

20 Qs

CCNA Security IINS Chapter 1 Quiz

CCNA Security IINS Chapter 1 Quiz

Professional Development

10 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

SLOT 1: Foundation 1

SLOT 1: Foundation 1

Professional Development

10 Qs

SEC+ Ch.10 Review Test

SEC+ Ch.10 Review Test

Professional Development

15 Qs

ISC2 - Chapter 1 - Module 1 - G2

ISC2 - Chapter 1 - Module 1 - G2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Sebastian Zamorano

Used 52+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by non-repudiation?

If a user does something, they can't later claim that they didn't do it.

Controls to protect the organization's reputation from harm due to inappropriate social media postings by employees, even if on their private accounts and personal time. 

It is part of the rules set by administrative controls.

It is a security feature that prevents session replay attacks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The concept of "secrecy" is most related to which foundational aspect of security?

Confidentiality

Integrity

Availability

Plausibility

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For which of the following assets is integrity probably the most important security aspect?

One frame of a streaming video

The file that contains passwords used to authenticate users

The color scheme of a marketing website

Software that checks the spelling of product descriptions for a retail website

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For which of the following systems would the security concept of availability probably be most important?

Medical systems that store patient data

Retail records of past transactions

Online streaming of camera feeds that display historical works of art in museums around the world

Medical systems that monitor patient condition in an intensive care unit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a "something you are" authentication factor?

A credit card presented to a cash machine

Your password and PIN

A user ID

A photograph of your face

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Security needs to be provided to ____ data?

Restricted

Illegal

Private

All

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the three pillars of information assurance?

Identification, Authentication, Non-repudiation

Data, User, Infrastructure

Confidentiality, Integrity, Availability

PII, PHI, Sensitive information

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?