02IA Quiz

02IA Quiz

12th Grade

10 Qs

quiz-placeholder

Similar activities

UH-VPN

UH-VPN

12th Grade

15 Qs

Their Security Quiz

Their Security Quiz

12th Grade

11 Qs

Information Security

Information Security

9th - 12th Grade

8 Qs

Cybersecurity and Global Impacts

Cybersecurity and Global Impacts

12th Grade

9 Qs

Cybersecurity Fundamentals Quiz

Cybersecurity Fundamentals Quiz

10th Grade - University

15 Qs

Confidentiality, Integrity, and Availability

Confidentiality, Integrity, and Availability

9th - 12th Grade

11 Qs

Network Fundamentals-Introduction to Networks Part 2

Network Fundamentals-Introduction to Networks Part 2

9th Grade - University

9 Qs

Unit 3 LO1 recap

Unit 3 LO1 recap

12th Grade

10 Qs

02IA Quiz

02IA Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Jhenice Sacdalan

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Defense in Depth refer to?

Securing the physical door

Security through layers of a building

Securing only the external perimeter

Securing only the internal part of a building

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is part of the CIA Triangle?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Authentication

Confidentiality, Integrity, and Accountability

Confidentiality, Integrity, and Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Non-repudiation?

Proving the legitimacy of a message or data transfer

Ensuring data is accurate and valid

Protecting data from unauthorized changes

Providing undeniable evidence of authenticity and integrity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Authentication in the context of information security?

Protecting data from theft and natural disasters

Ensuring data is accessible when needed

Tracking who touches data and when

Verifying identification to an application or system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Assets in the context of information security?

Organizational resources being protected

Weaknesses in data confidentiality

Probabilities of threats becoming realities

Parameters implemented to protect data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Threat in the context of information security?

An organizational resource being protected

The act of verifying identification

A weakness in data confidentiality

A possibility of data or systems being compromised

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Risk Response Techniques?

Acknowledging risk without addressing it

Transferring risk to a third party

Avoiding risk by not engaging in the activity

Attempting to address risk by making it less serious

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?