ISC2 - Chapter 1 - Module 1 - G2

Quiz
•
Computers
•
Professional Development
•
Medium
Sebastian Zamorano
Used 69+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is meant by non-repudiation?
If a user does something, they can't later claim that they didn't do it.
Controls to protect the organization's reputation from harm due to inappropriate social media postings by employees, even if on their private accounts and personal time.
It is part of the rules set by administrative controls.
It is a security feature that prevents session replay attacks.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The concept of "secrecy" is most related to which foundational aspect of security?
Confidentiality
Integrity
Availability
Plausibility
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For which of the following assets is integrity probably the most important security aspect?
One frame of a streaming video
The file that contains passwords used to authenticate users
The color scheme of a marketing website
Software that checks the spelling of product descriptions for a retail website
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For which of the following systems would the security concept of availability probably be most important?
Medical systems that store patient data
Retail records of past transactions
Online streaming of camera feeds that display historical works of art in museums around the world
Medical systems that monitor patient condition in an intensive care unit
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a "something you are" authentication factor?
A credit card presented to a cash machine
Your password and PIN
A user ID
A photograph of your face
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Security needs to be provided to ____ data?
Restricted
Illegal
Private
All
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the three pillars of information assurance?
Identification, Authentication, Non-repudiation
Data, User, Infrastructure
Confidentiality, Integrity, Availability
PII, PHI, Sensitive information
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Activity2

Quiz
•
Professional Development
15 questions
Security+ Study Guide-10 Understanding Cryptography and PKI

Quiz
•
Professional Development
15 questions
SEC+ Ch.10 Review Test

Quiz
•
Professional Development
15 questions
Encryption

Quiz
•
Professional Development
16 questions
Introduction to Cybersecurity + linux

Quiz
•
Professional Development
17 questions
Cyber Quiz

Quiz
•
Professional Development
15 questions
Sec+ CH.1 Review Test

Quiz
•
Professional Development
15 questions
Sec+ CH.2 Review Test

Quiz
•
Professional Development
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade