
IAS Midterm Reviewer
Authored by Kalo
Computers
University
Used 45+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
72 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Protection of the confidentiality, integrity, and availability of information assets, whether in storage, processing, or transmission, via the application of policy, education, training and awareness, and technology.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The quality or state of being secure to be free from danger or harm
security
confidentiality
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A model designed to guide policies for information security within an organization.
Software Assurance
NIST Approach
C.A.I Triangle
C.I.A Triangle
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Ensures that only users with the rights, privileges, and need to access information are able to do so.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Whole, complete, and uncorrupted
Availability
Confidentiality
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Enables authorized users—people or computer systems—to access information without interference or obstruction and to receive it in the required format.
Confidentiality
Quality
Integrity
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ensures that only users with the rights, privileges, and need to access information are able to do so.
Confidentiality
Integrity
Availability
Quality
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?