ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

University

20 Qs

quiz-placeholder

Similar activities

ICT 0513 - Chapter 4 : System Unit

ICT 0513 - Chapter 4 : System Unit

University

15 Qs

Pra UPS 2

Pra UPS 2

University

20 Qs

From Binary To Denary Conversion - IGCSE

From Binary To Denary Conversion - IGCSE

7th Grade - Professional Development

20 Qs

DWDM-2

DWDM-2

University

20 Qs

Kuis Artificial Intelligence

Kuis Artificial Intelligence

University

15 Qs

Relational Algebra and Calculus

Relational Algebra and Calculus

University

20 Qs

Artificial Intelligence CT-1

Artificial Intelligence CT-1

University

20 Qs

ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

Assessment

Quiz

Computers

University

Hard

Created by

skema lecturer

Used 13+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Organizations should be aware that information security planning and budgetary choices encompass three different groups of;

Professionals in the realm of information technology

Individuals within the realm of cybersecurity

Individuals from other departments within the organization

Freelance or external contractor hired in the organization

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

"Shields the organization's information assets against the numerous threats they encounter."


This statement refer to:

The information security community

The IT community

The general business community

The clients community

3.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which of the following are the areas of security?

Network security

Security Guard

Communications security

Operations security

Cyber security

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Information security, often abbreviated as InfoSec, is centered on safeguarding information and its inherent value-adding attributes, which encompass confidentiality, ________, and availability. This entails the utilization of technology to store and transmit information, alongside a range of protective measures including policies, training and awareness initiatives, and technology itself.

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Media Image

In the figure components of information security what was missing?

Computer Security

Data Security

Network Security

Cyber Security

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

"An attribute of information that characterizes its state as undivided, intact, and free from corruption."
This statement refer to;

Confidentiality

Integrity

Security

Availability

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

"An inherent flaw in an asset or the systems responsible for its protection." This statement refer to;

Attack

Exploit

Phishing

Vulnerability

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?