CO2521 Revision Part 2

CO2521 Revision Part 2

University

8 Qs

quiz-placeholder

Similar activities

IS development(chapter3)

IS development(chapter3)

University

10 Qs

Cloud Computing

Cloud Computing

KG - Professional Development

11 Qs

Week #7 - Risk Management

Week #7 - Risk Management

University

12 Qs

CNET251 - Ch 7 Treating Risk

CNET251 - Ch 7 Treating Risk

University

10 Qs

InfoSec Chapter 6 - Risk Management

InfoSec Chapter 6 - Risk Management

University

10 Qs

Info., IT and Data Governance

Info., IT and Data Governance

University

10 Qs

Chapter 14 Controlling and Monitoring Access

Chapter 14 Controlling and Monitoring Access

University

10 Qs

SPM 24/08/2020

SPM 24/08/2020

University

10 Qs

CO2521 Revision Part 2

CO2521 Revision Part 2

Assessment

Quiz

Created by

Christopher Finnigan

Computers

University

3 plays

Medium

8 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 4 pts

Define and explain any TWO components of the CIA triad.

Evaluate responses using AI:

OFF

2.

MATCH QUESTION

1 min • 4 pts

Match the following quantitative risk assessment terminologies

The expected financial loss that an organization would incur in a year from a particular risk.

Single Loss Expectance

A numerical value that represents the number of times a risk event is expected to occur in a year.

Exposure Factor

A numerical value that represents the proportion of asset value that would be lost in an attack.

Annualized Loss Expectancy

It is a monetary value that represents the cost of a single loss event.

Annual Rate of Occurrence

3.

DRAG AND DROP QUESTION

1 min • 1 pt

​ (a)   = ​ (b)   x Exposure Factor

Single Loss Expectancy
Asset Value
Occurrence
Risk
Annual Rate of Occurrence

Answer explanation

Single Loss Expectancy = AV x EF

4.

DRAG AND DROP QUESTION

45 sec • 2 pts

​ (a)   is the practice of concealing the existence of a message within another seemingly innocent message or cover medium.

​ (b)   is focused on securing the content of a message by transforming it so that only the intended recipient can understand it,

Steganography
Cryptography

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a characteristic of hash algorithms?

Unique

Secure

Fixed-size

Fast

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these would NOT be part of the architecture description?

system requirements

functionality

behaviour

risk

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these IS a function of Security Controls?

Risk Management: It is designed to mitigate risks and reduce the impact of security incidents.

Business Operations: such as supply chain management systems

Human Resource Management:such as hiring, training, and performance management

Financial management: the management of an organisation's financial resources, including planning and budgeting,

8.

LABELLING QUESTION

1 min • 4 pts

Label the missing stages of the Electronic Discovery Reference Model.

d
c
b
a
Presentation
Preservation
Analysis
Identification

Answer explanation

An attacker who is able to exploit a buffer overflow vulnerability can gain a number of benefits, including:

Arbitrary code execution

Denial of Service (DoS)

Information disclosure

Privilege escalation