IT308 IAS Quiz No 1 IT3GG1

IT308 IAS Quiz No 1 IT3GG1

University

30 Qs

quiz-placeholder

Similar activities

ISC2 - CC - Chapter 1 - Module 2

ISC2 - CC - Chapter 1 - Module 2

University

35 Qs

Cybersecurity Formative Assessment

Cybersecurity Formative Assessment

12th Grade - University

34 Qs

Module 1.1 - Introduction to GRC

Module 1.1 - Introduction to GRC

University

34 Qs

ICT Cybersecurity Essentials

ICT Cybersecurity Essentials

10th Grade - University

25 Qs

CYBERSECURITY QUIZ

CYBERSECURITY QUIZ

University

25 Qs

ISO27001

ISO27001

University

31 Qs

AEIC 326 Topic 1: Review - Computer Security Quiz

AEIC 326 Topic 1: Review - Computer Security Quiz

University

25 Qs

Cybersecurity Web Vulnerabilities

Cybersecurity Web Vulnerabilities

University

26 Qs

IT308 IAS Quiz No 1 IT3GG1

IT308 IAS Quiz No 1 IT3GG1

Assessment

Quiz

Computers

University

Medium

Created by

Edwin Garcia

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the U.S. Government's definition of INFOSEC?

Development of information systems for educational purposes.

Regulation of information systems for commercial use.

Enhancement of information systems for public access.

Protection of information systems against unauthorized access or modification.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When did the origins of information security emerge?

Post Cold War

Post World War II

Post World War I

Post Vietnam War

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the critical characteristics of information according to the C.I.A. Triangle?

Availability, Accuracy, Authenticity

Confidentiality, Integrity, and Availability

Integrity, Availability, Possession

Accuracy, Authenticity, Confidentiality

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the components of an Information System according to the CNSS Security Model?

Software, Hardware, Networks, Protocols, Personnel

Software, Hardware, Networks, Applications, Users

Software, Hardware, Networks, Procedures, People

Software, Hardware, Networks, Databases, Administrators

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the phases of the Security Systems Development Life Cycle (SecSDLC)?

Planning, Execution, Monitoring, Closure

Design, Develop, Test, Deploy

Investigation, Analysis, Logical Design, Physical Design, Implementation, Maintenance, and Change

Initiation, Planning, Execution, Closure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the roles of Security Professionals & Organization?

Senior Management (COO, CTO), Information Security Project Team

Senior Management (CMO, CHRO), Information Security Project Team

Senior Management (CIO, CISO), Information Security Project Team

Senior Management (CEO, CFO), Information Security Project Team

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of Risk in the context of information security?

Probability of unwanted events

Certainty of unwanted events

Certainty of wanted events

Possibility of wanted events

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?