ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

University

20 Qs

quiz-placeholder

Similar activities

IAS Quiz 1

IAS Quiz 1

University

16 Qs

CNS_Semi-Final Quiz

CNS_Semi-Final Quiz

University

25 Qs

Infrastructure Architects and Network administrators Quiz

Infrastructure Architects and Network administrators Quiz

11th Grade - Professional Development

18 Qs

ISMS Revision

ISMS Revision

University

22 Qs

Sec Pro 10.5-6 Mobile Device Security and Management

Sec Pro 10.5-6 Mobile Device Security and Management

11th Grade - University

20 Qs

Introduction to Database

Introduction to Database

University

20 Qs

AIS160 Chapter 6: Cloud Computing in Accounting & FinTech

AIS160 Chapter 6: Cloud Computing in Accounting & FinTech

University

20 Qs

IOT AND CLOUD COMPUTING QUIZ 1

IOT AND CLOUD COMPUTING QUIZ 1

12th Grade - University

20 Qs

ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

Assessment

Quiz

Computers

University

Hard

Created by

skema lecturer

Used 12+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Organizations should be aware that information security planning and budgetary choices encompass three different groups of;

Professionals in the realm of information technology

Individuals within the realm of cybersecurity

Individuals from other departments within the organization

Freelance or external contractor hired in the organization

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

"Shields the organization's information assets against the numerous threats they encounter."


This statement refer to:

The information security community

The IT community

The general business community

The clients community

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are the areas of security?

Network security

Security Guard

Communications security

Operations security

Cyber security

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Information security, often abbreviated as InfoSec, is centered on safeguarding information and its inherent value-adding attributes, which encompass confidentiality, ________, and availability. This entails the utilization of technology to store and transmit information, alongside a range of protective measures including policies, training and awareness initiatives, and technology itself.

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Media Image

In the figure components of information security what was missing?

Computer Security

Data Security

Network Security

Cyber Security

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

"An attribute of information that characterizes its state as undivided, intact, and free from corruption."
This statement refer to;

Confidentiality

Integrity

Security

Availability

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

"An inherent flaw in an asset or the systems responsible for its protection." This statement refer to;

Attack

Exploit

Phishing

Vulnerability

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?