IT308 IAS Quiz No 1 IT3GG1

IT308 IAS Quiz No 1 IT3GG1

University

30 Qs

quiz-placeholder

Similar activities

Round 2

Round 2

University

25 Qs

IAS Semi Final Exam

IAS Semi Final Exam

University

25 Qs

Module 1.1: Common Threats

Module 1.1: Common Threats

11th Grade - University

25 Qs

Cybersecurity Fundamentals Practice Quiz

Cybersecurity Fundamentals Practice Quiz

University

25 Qs

Cybersecurity Essentials Chapter 8

Cybersecurity Essentials Chapter 8

10th Grade - University

25 Qs

Chapter 1 Intro to Cybersecurity Cisco

Chapter 1 Intro to Cybersecurity Cisco

10th Grade - University

25 Qs

ISC2 - CC - Chapter 2 - Module 1

ISC2 - CC - Chapter 2 - Module 1

University

28 Qs

Understanding Software Updates

Understanding Software Updates

10th Grade - University

25 Qs

IT308 IAS Quiz No 1 IT3GG1

IT308 IAS Quiz No 1 IT3GG1

Assessment

Quiz

Computers

University

Medium

Created by

Edwin Garcia

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the U.S. Government's definition of INFOSEC?

Development of information systems for educational purposes.

Regulation of information systems for commercial use.

Enhancement of information systems for public access.

Protection of information systems against unauthorized access or modification.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When did the origins of information security emerge?

Post Cold War

Post World War II

Post World War I

Post Vietnam War

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the critical characteristics of information according to the C.I.A. Triangle?

Availability, Accuracy, Authenticity

Confidentiality, Integrity, and Availability

Integrity, Availability, Possession

Accuracy, Authenticity, Confidentiality

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the components of an Information System according to the CNSS Security Model?

Software, Hardware, Networks, Protocols, Personnel

Software, Hardware, Networks, Applications, Users

Software, Hardware, Networks, Procedures, People

Software, Hardware, Networks, Databases, Administrators

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the phases of the Security Systems Development Life Cycle (SecSDLC)?

Planning, Execution, Monitoring, Closure

Design, Develop, Test, Deploy

Investigation, Analysis, Logical Design, Physical Design, Implementation, Maintenance, and Change

Initiation, Planning, Execution, Closure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the roles of Security Professionals & Organization?

Senior Management (COO, CTO), Information Security Project Team

Senior Management (CMO, CHRO), Information Security Project Team

Senior Management (CIO, CISO), Information Security Project Team

Senior Management (CEO, CFO), Information Security Project Team

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of Risk in the context of information security?

Probability of unwanted events

Certainty of unwanted events

Certainty of wanted events

Possibility of wanted events

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?