IAS2-NW3A

IAS2-NW3A

University

50 Qs

quiz-placeholder

Similar activities

CSC 308 ISA MIDTERM EXAM

CSC 308 ISA MIDTERM EXAM

University

45 Qs

F1823

F1823

University

50 Qs

Computer Science Quiz

Computer Science Quiz

University

50 Qs

Windows-Administration-Security : Quiz 2

Windows-Administration-Security : Quiz 2

University

53 Qs

LONG QUIZ FOR INFO SYSTEM MNGT

LONG QUIZ FOR INFO SYSTEM MNGT

University

50 Qs

CCSA

CCSA

University

50 Qs

Syber mid1

Syber mid1

University

46 Qs

Chapter 5.4

Chapter 5.4

University

53 Qs

IAS2-NW3A

IAS2-NW3A

Assessment

Quiz

Computers

University

Easy

Created by

Jhenice Sacdalan

Used 4+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following interpret requirements and apply them to specific situations?

Policies

Standards

Guidelines

Procedure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

Available Resources

Business needs

Levels of Effort

Projected Costs

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cybersecurity principle is most important when attempting to trace the source of malicious activity?

Availability

Nonrepudiation

Integrity

Confidentiality

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Outsourcing poses the greatest risk to an organization when it involves:

Business Support Services

Core Business Functions

Technology Infrastructure

Cybersecurity Capabilies

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Risk assessments should be performed:

At the start of a program

On a regular basis

When an asset changes

When a vulnerability is discovered

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During which phase of the system development lifecycle (SDLC) should security first be considered?

Analysis

Planning

Design

Implementation

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Who has the greatest influence over access security in a password authentication environment?

System Administrators

Users

Business Executives

Security Manager

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?