Cyber Security Competency

Cyber Security Competency

University

11 Qs

quiz-placeholder

Similar activities

IAS101 - Week 8

IAS101 - Week 8

University

15 Qs

CNET251 Ch 8 - Security Management Models

CNET251 Ch 8 - Security Management Models

University

11 Qs

Week #7 - Risk Management

Week #7 - Risk Management

University

12 Qs

ICT 3 INFORMATION ASSURANCE AND SECURITY

ICT 3 INFORMATION ASSURANCE AND SECURITY

University

10 Qs

3C QUIZ

3C QUIZ

University

13 Qs

Re-Quiz Chapter 1: Introduction to Network Security

Re-Quiz Chapter 1: Introduction to Network Security

University

10 Qs

ISA 1 - QUIZ 2

ISA 1 - QUIZ 2

University

10 Qs

Chapter 14 Controlling and Monitoring Access

Chapter 14 Controlling and Monitoring Access

University

10 Qs

Cyber Security Competency

Cyber Security Competency

Assessment

Quiz

Computers

University

Medium

Created by

Ryan Escorial

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a component of the CIA triad?

Confidentiality
Integrity
Availability
Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the primary goal of the CIA triad?

To protect the integrity of information assets

To ensure the availability of information assets

To prevent unauthorized access to information assets

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a material form of information?

A digital photograph

A paper document

A voice recording

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an unrepresented form of information?

Information that is not stored in a physical or digital format

Information that is not easily accessible

Information that is not relevant to security

Information that is not important to the organization

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of information security when it comes to information assets?

To protect the integrity of information assets

To ensure the availability of information assets

To prevent unauthorized access to information assets

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which standard contains guidelines for implementing security controls?

ISO 27001

ISO 27000

ISO 27005

ISO 27002

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Is a business process considered an asset in the context of information security?

Yes

No

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?