Information Security Quiz2

Information Security Quiz2

University

15 Qs

quiz-placeholder

Similar activities

CH 9: Emerging Issues in Cyber Law

CH 9: Emerging Issues in Cyber Law

University

10 Qs

Siege One

Siege One

University

10 Qs

Living in the IT Era - Q1

Living in the IT Era - Q1

University

15 Qs

Cybersecurity

Cybersecurity

University

12 Qs

Computer Technology

Computer Technology

University

10 Qs

AIC 1

AIC 1

University

10 Qs

Average level

Average level

University

15 Qs

Software Defined Networking

Software Defined Networking

University

10 Qs

Information Security Quiz2

Information Security Quiz2

Assessment

Quiz

Computers

University

Hard

Created by

Kenneth Hernandez

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What field focuses on managing risks associated with using, processing, storing, and transferring data?

Information Technology

Information Assurance

Cybersecurity

Data Science

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security measure ensures that information is not disclosed to unauthorized individuals or devices?

Authenticity

Confidentiality

Integrity

Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does integrity refer to in terms of information security?

Ensuring authorized users have access to information

Encryption of highly confidential data

Safeguarding the accuracy and completeness of information

Verifying an individual's authorization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security attribute establishes the validity of a transmission or originator?

Authenticity

Non-repudiation

Confidentiality

Integrity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does non-repudiation assure in terms of data transmission?

Proof of sender's identity

Timely access to information services

Encryption of data

Proof of delivery for the recipient

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which discipline focuses on developing tools and countermeasures to protect information from external threats?

Information Technology

Data Science

Information Security

Network Administration

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the commentator's analogy to describe the SolarWinds cyber-attack?

The Digital Tsunami

IT's Pearl Harbor

Cyber Warfare

The Digital Apocalypse

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?