IAS2-NW3A

IAS2-NW3A

University

50 Qs

quiz-placeholder

Similar activities

икт 46-90

икт 46-90

University

45 Qs

Module 10

Module 10

University

48 Qs

GEOGRAPHICAL INFORMATION SYSTEM

GEOGRAPHICAL INFORMATION SYSTEM

University

50 Qs

Unit 5 - communication plan

Unit 5 - communication plan

University

48 Qs

INSW Hardware Review - ICT 2022/2023

INSW Hardware Review - ICT 2022/2023

University

50 Qs

IS 224_Midterm Exam

IS 224_Midterm Exam

University

50 Qs

LONG QUIZ FOR INFO SYSTEM MNGT

LONG QUIZ FOR INFO SYSTEM MNGT

University

50 Qs

Windows-Administration-Security : Quiz 2

Windows-Administration-Security : Quiz 2

University

53 Qs

IAS2-NW3A

IAS2-NW3A

Assessment

Quiz

Computers

University

Easy

Created by

Jhenice Sacdalan

Used 4+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following interpret requirements and apply them to specific situations?

Policies

Standards

Guidelines

Procedure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

Available Resources

Business needs

Levels of Effort

Projected Costs

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cybersecurity principle is most important when attempting to trace the source of malicious activity?

Availability

Nonrepudiation

Integrity

Confidentiality

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Outsourcing poses the greatest risk to an organization when it involves:

Business Support Services

Core Business Functions

Technology Infrastructure

Cybersecurity Capabilies

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Risk assessments should be performed:

At the start of a program

On a regular basis

When an asset changes

When a vulnerability is discovered

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During which phase of the system development lifecycle (SDLC) should security first be considered?

Analysis

Planning

Design

Implementation

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Who has the greatest influence over access security in a password authentication environment?

System Administrators

Users

Business Executives

Security Manager

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?