Search Header Logo

DIS Revision 1

Authored by sapna sri

Computers

University

Used 3+ times

DIS Revision  1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).

firewall

computer security

antivirus

computer communication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CIA triad concepts ............

Continuous

Integrity

Availability

Confidentiality

Internet

Availability

Confidentiality

Integrity

Accountability

Confidentiality

Integrity

Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

Data confidentiality

Data privacy

Data collection

Data protect

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

confidentiality

availability

integrity

modify

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A flaw or weakness in a system’s design or operation violate the system’s security policy is known as _________

risk

asset

vulnerability

integrity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.

asset

attack

risk

measure

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.

protocol

layer network

resource ledger

Security Policy

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?