Information Security

Information Security

University

•

22 Qs

quiz-placeholder

Similar activities

All the President's Men

All the President's Men

KG - University

•

20 Qs

Arts & Entertainment

Arts & Entertainment

10th Grade - University

•

20 Qs

HKMNOP C2

HKMNOP C2

University - Professional Development

•

20 Qs

Musical Intervals

Musical Intervals

4th Grade - Professional Development

•

20 Qs

We are all here_!

We are all here_!

9th Grade - University

•

20 Qs

Orchestra notes, rests, & other symbols

Orchestra notes, rests, & other symbols

KG - University

•

19 Qs

Auditing

Auditing

University

•

20 Qs

ART OF FILM

ART OF FILM

7th Grade - Professional Development

•

21 Qs

Information Security

Information Security

Assessment

Quiz

•

Arts

•

University

•

Practice Problem

•

Medium

Created by

Anitha D

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the term which denotes that only authorized users are capable of accessing the information

Confidentiality

Availability

Integrity

Non-repudiation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

State whether True or False: Data encryption is primarily used to ensure confidentiality.

True

False

Cannot be interpreted

None

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the oldest phone hacking technique used by hackers to make free calls.

Spamming

phreaking

cracking

phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following platforms is used for the safety and protection of information in the cloud?

AWS

Cloud workload protection platforms

cloud security protocols

One Drive

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which category does compromising confidential information fall?

Threat

Bug

Attack

Vulnerability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which category does the lack access control policy fall?

Threat

Bug

Attack

Vulnerability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the class of computer threats.

phishing

DOS attack

soliciting

Both B & C

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?