Search Header Logo

Quiz No. 1

Authored by Teresita Mangahas

Computers

University

Used 15+ times

Quiz No. 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

These threats usually come from employees who are untrained in computers and are unaware of security threats and vulnerabilities. Typically by an accident or negligence.

Harmless Attack

Catastrophic attach

Non-malicious attach

Malicious attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security threat where a sudden and total failure from which recovery is impossible. Often lead to cascading systems failure.

Harmless attack

Catastrophic attach

Non-malicious

Malicious attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security layer that protects the physical items, objects, or areas of an organization from unauthorized access and misuse.

Network security

Physical security

Communications security

Personal security

Information security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security layer that protects an organization’s communications media, technology, and content

Network security

Physical security

Communications security

Personal security

Information security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security layer that protects an individual or group of individuals who are authorized to access the organization and its operations.

Network security

Physical security

Communications security

Personal security

Information security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information

Network security

Physical security

Communications security

Personal security

Information security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The ability of a system to ensure that assets are viewable only by authorized parties

Availability

Integrity

Security

Confidentiality

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?