IAS2-NW3A

IAS2-NW3A

University

50 Qs

quiz-placeholder

Similar activities

F1823

F1823

University

50 Qs

Computer Science Quiz

Computer Science Quiz

University

50 Qs

9628-09 City & Guilds Level 3 Award in Coding and Logic Quiz 3

9628-09 City & Guilds Level 3 Award in Coding and Logic Quiz 3

11th Grade - Professional Development

50 Qs

Syber mid1

Syber mid1

University

46 Qs

Quiz 2 - Midterm

Quiz 2 - Midterm

University

50 Qs

ICT 2 вариант AA

ICT 2 вариант AA

University

50 Qs

DBMS Unit 1 Exam

DBMS Unit 1 Exam

University

50 Qs

Sec+ Day 7

Sec+ Day 7

12th Grade - University

50 Qs

IAS2-NW3A

IAS2-NW3A

Assessment

Quiz

Computers

University

Easy

Created by

Jhenice Sacdalan

Used 4+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following interpret requirements and apply them to specific situations?

Policies

Standards

Guidelines

Procedure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

Available Resources

Business needs

Levels of Effort

Projected Costs

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cybersecurity principle is most important when attempting to trace the source of malicious activity?

Availability

Nonrepudiation

Integrity

Confidentiality

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Outsourcing poses the greatest risk to an organization when it involves:

Business Support Services

Core Business Functions

Technology Infrastructure

Cybersecurity Capabilies

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Risk assessments should be performed:

At the start of a program

On a regular basis

When an asset changes

When a vulnerability is discovered

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During which phase of the system development lifecycle (SDLC) should security first be considered?

Analysis

Planning

Design

Implementation

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Who has the greatest influence over access security in a password authentication environment?

System Administrators

Users

Business Executives

Security Manager

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?