DIS Revision  1

DIS Revision 1

University

30 Qs

quiz-placeholder

Similar activities

Cybersecurity Web Vulnerabilities

Cybersecurity Web Vulnerabilities

University

26 Qs

CyberSecurity LongQuiz (Prelim)

CyberSecurity LongQuiz (Prelim)

University

30 Qs

INFORMATION ASSURANCE AND SECURITY - QUIZ1

INFORMATION ASSURANCE AND SECURITY - QUIZ1

University

27 Qs

UTS Keamanan Sistem A

UTS Keamanan Sistem A

University

30 Qs

IT308 IAS Quiz No 1 IT3GG1

IT308 IAS Quiz No 1 IT3GG1

University

30 Qs

STC - Cyber Security and Forensics

STC - Cyber Security and Forensics

University

30 Qs

Network Security 3

Network Security 3

University

32 Qs

Resiliency and Site Security

Resiliency and Site Security

9th Grade - University

25 Qs

DIS Revision  1

DIS Revision 1

Assessment

Quiz

Computers

University

Medium

Created by

sapna sri

Used 3+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The protection afforded to an automated information system in order to attain the applicable objectives of preserving the integrity, availability, and confidentiality of information system resources (includes hardware, software, firmware, information/data, and telecommunications).

firewall

computer security

antivirus

computer communication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

CIA triad concepts ............

Continuous

Integrity

Availability

Confidentiality

Internet

Availability

Confidentiality

Integrity

Accountability

Confidentiality

Integrity

Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Assures that private or confidential information is not made available or disclosed to unauthorized individuals.

Data confidentiality

Data privacy

Data collection

Data protect

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Guarding against improper information modification or destruction, including ensuring information nonrepudiation and authenticity.

confidentiality

availability

integrity

modify

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A flaw or weakness in a system’s design or operation violate the system’s security policy is known as _________

risk

asset

vulnerability

integrity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An expectation of loss expressed as the probability that a particular threat will exploit a particular vulnerability with a particular harmful result.

asset

attack

risk

measure

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.

protocol

layer network

resource ledger

Security Policy

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?