QUIZ MATERI #5

QUIZ MATERI #5

12th Grade

5 Qs

quiz-placeholder

Similar activities

Business Law:  Indicator 3.02

Business Law: Indicator 3.02

KG - University

9 Qs

Santa Claus 2.0

Santa Claus 2.0

KG - Professional Development

10 Qs

Unit 1: Computing and Society (CAS) Mid-Unit Assessment Review

Unit 1: Computing and Society (CAS) Mid-Unit Assessment Review

9th - 12th Grade

10 Qs

Best Places to Work

Best Places to Work

12th Grade

8 Qs

Immigration Policies and Legal Frameworks

Immigration Policies and Legal Frameworks

12th Grade

10 Qs

Groups in context 1

Groups in context 1

11th - 12th Grade

10 Qs

1.3.1e - Cloud Storage

1.3.1e - Cloud Storage

9th - 12th Grade

10 Qs

13th Hole

13th Hole

9th - 12th Grade

10 Qs

QUIZ MATERI #5

QUIZ MATERI #5

Assessment

Quiz

Other

12th Grade

Medium

Created by

amrul jakarta

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who approves the incident response policy?

(ISC)²

Senior management

The security manager

Investor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True of False? Business continuity planning is a reactive procedure that restores business operations after a disruption occurs.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is likely to be included in the business continuity plan?

Alternate work areas for personnel affected by a natural disaster

The organization’s strategic security approach

Last year’s budge information

Log data from all systems

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tekila works for a government agency. All data in the agency is assigned a particular sensitivity level, called a "classification." Every person in the agency is assigned a "clearance" level, which determines the classification of data each person can access. What is the access control model being implemented in Tekila's agency?

MAC (mandatory access control)

DAC (discretionary access control)

RBAC (role-based access control)

FAC (formal access control)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In order for a biometric security to function properly, an authorized person's physiological data must be ______.

Broadcast

Stored

Deleted

Modified