02IA Quiz

02IA Quiz

12th Grade

10 Qs

quiz-placeholder

Similar activities

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

Quiz 9 (15.09.2021)

Quiz 9 (15.09.2021)

1st - 12th Grade

10 Qs

Cloud Computing

Cloud Computing

12th Grade

10 Qs

Data Engineering y BigQuery V1

Data Engineering y BigQuery V1

12th Grade

10 Qs

Technology trends

Technology trends

7th - 12th Grade

15 Qs

PRE-ASSESSMENT ETECH  M1

PRE-ASSESSMENT ETECH M1

12th Grade

10 Qs

ASAS SAINS KOMPUTER : TINGKATAN 3

ASAS SAINS KOMPUTER : TINGKATAN 3

4th Grade - University

12 Qs

02IA Quiz

02IA Quiz

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Jhenice Sacdalan

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Defense in Depth refer to?

Securing the physical door

Security through layers of a building

Securing only the external perimeter

Securing only the internal part of a building

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is part of the CIA Triangle?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Authentication

Confidentiality, Integrity, and Accountability

Confidentiality, Integrity, and Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Non-repudiation?

Proving the legitimacy of a message or data transfer

Ensuring data is accurate and valid

Protecting data from unauthorized changes

Providing undeniable evidence of authenticity and integrity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Authentication in the context of information security?

Protecting data from theft and natural disasters

Ensuring data is accessible when needed

Tracking who touches data and when

Verifying identification to an application or system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Assets in the context of information security?

Organizational resources being protected

Weaknesses in data confidentiality

Probabilities of threats becoming realities

Parameters implemented to protect data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Threat in the context of information security?

An organizational resource being protected

The act of verifying identification

A weakness in data confidentiality

A possibility of data or systems being compromised

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Risk Response Techniques?

Acknowledging risk without addressing it

Transferring risk to a third party

Avoiding risk by not engaging in the activity

Attempting to address risk by making it less serious

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?