ISA 1 - QUIZ 2

ISA 1 - QUIZ 2

University

10 Qs

quiz-placeholder

Similar activities

iCIO Contribute - Binus University

iCIO Contribute - Binus University

University

10 Qs

Chapter 5 SAD

Chapter 5 SAD

University

10 Qs

Cyber forensic and security

Cyber forensic and security

University

15 Qs

CBY 207 Module 1 -Quiz1

CBY 207 Module 1 -Quiz1

University

10 Qs

Cybersecurity

Cybersecurity

University

12 Qs

Activity 1 - IAS 101

Activity 1 - IAS 101

University

12 Qs

Network Fundamentals-Introduction to Networks Part 2

Network Fundamentals-Introduction to Networks Part 2

9th Grade - University

9 Qs

3C QUIZ

3C QUIZ

University

13 Qs

ISA 1 - QUIZ 2

ISA 1 - QUIZ 2

Assessment

Quiz

Computers

University

Medium

Created by

Manuel Santos

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It protects the physical items, objects, or areas of an organization from unauthorized access and misuse.

Operations security

Physical security

Communications security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It protects the individual or group of individuals who are authorized to access the organization and its operations.

Operations security

Physical security

Personal security

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It protects the details of a particular operation or series of activities.

Operations security

Physical security

Personal security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It protects the organization9s communications media, technology, and content.

Operations security

Communication security

Personal security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It protects the networking components, connections, and contents.

Operations security

Communication security

Network security

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The quality or state of preventing disclosure or exposure to unauthorized individuals or systems.

Confidentiality

Integrity

Utility

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Enables users who need to access information to do so without interference or obstruction and in the required format. The information is said to be available to an authorized user when and where needed and in the correct format.

Confidentiality

Availability

Utility

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?