Define and explain any TWO components of the CIA triad.

CO2521 Revision Part 2

Quiz
•

Christopher Finnigan
•
Computers
•
University
•
3 plays
•
Medium
8 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 4 pts
Evaluate responses using AI:
OFF
2.
MATCH QUESTION
1 min • 4 pts
Match the following quantitative risk assessment terminologies
The expected financial loss that an organization would incur in a year from a particular risk.
Single Loss Expectance
A numerical value that represents the number of times a risk event is expected to occur in a year.
Exposure Factor
A numerical value that represents the proportion of asset value that would be lost in an attack.
Annualized Loss Expectancy
It is a monetary value that represents the cost of a single loss event.
Annual Rate of Occurrence
3.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) = (b) x Exposure Factor
Answer explanation
Single Loss Expectancy = AV x EF
4.
DRAG AND DROP QUESTION
45 sec • 2 pts
(a) is the practice of concealing the existence of a message within another seemingly innocent message or cover medium.
(b) is focused on securing the content of a message by transforming it so that only the intended recipient can understand it,
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is NOT a characteristic of hash algorithms?
Unique
Secure
Fixed-size
Fast
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these would NOT be part of the architecture description?
system requirements
functionality
behaviour
risk
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these IS a function of Security Controls?
Risk Management: It is designed to mitigate risks and reduce the impact of security incidents.
Business Operations: such as supply chain management systems
Human Resource Management:such as hiring, training, and performance management
Financial management: the management of an organisation's financial resources, including planning and budgeting,
8.
LABELLING QUESTION
1 min • 4 pts
Label the missing stages of the Electronic Discovery Reference Model.
Answer explanation
An attacker who is able to exploit a buffer overflow vulnerability can gain a number of benefits, including:
Arbitrary code execution
Denial of Service (DoS)
Information disclosure
Privilege escalation
Similar Resources on Quizizz
11 questions
Cloud Computing

Quiz
•
KG - Professional Dev...
10 questions
InfoSec Chapter 6 - Risk Management

Quiz
•
University
10 questions
Risk Management

Quiz
•
University
5 questions
Activity

Quiz
•
University
10 questions
IAS 1 - RM

Quiz
•
University
10 questions
ECM3435 IT Consulting 1 - Organisational IT environments

Quiz
•
University
10 questions
EXERCISE_RELATIONALDATABASE

Quiz
•
University
10 questions
CH 4 - PLANNING FOR SECURITY

Quiz
•
University
Popular Resources on Quizizz
39 questions
Respect and How to Show It

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
10 questions
Human Body Systems and Functions

Interactive video
•
6th - 8th Grade
20 questions
Multiplication Facts

Quiz
•
3rd Grade
Discover more resources for Computers
20 questions
Summer

Quiz
•
KG - University
19 questions
Minecraft

Quiz
•
6th Grade - Professio...
20 questions
3rd Grade Review

Quiz
•
KG - University
15 questions
Minecraft

Quiz
•
University
52 questions
Logos Trivia

Quiz
•
KG - University
7 questions
New national park celebrates Harriet Tubman's legacy

Interactive video
•
11th Grade - University
8 questions
2 Step Word Problems

Quiz
•
KG - University
20 questions
Disney characters

Quiz
•
KG - Professional Dev...