Search Header Logo

02IA Quiz

Authored by Jhenice Sacdalan

Computers

12th Grade

02IA Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Defense in Depth refer to?

Securing the physical door

Security through layers of a building

Securing only the external perimeter

Securing only the internal part of a building

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is part of the CIA Triangle?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Authentication

Confidentiality, Integrity, and Accountability

Confidentiality, Integrity, and Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Non-repudiation?

Proving the legitimacy of a message or data transfer

Ensuring data is accurate and valid

Protecting data from unauthorized changes

Providing undeniable evidence of authenticity and integrity

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Authentication in the context of information security?

Protecting data from theft and natural disasters

Ensuring data is accessible when needed

Tracking who touches data and when

Verifying identification to an application or system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Assets in the context of information security?

Organizational resources being protected

Weaknesses in data confidentiality

Probabilities of threats becoming realities

Parameters implemented to protect data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Threat in the context of information security?

An organizational resource being protected

The act of verifying identification

A weakness in data confidentiality

A possibility of data or systems being compromised

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Risk Response Techniques?

Acknowledging risk without addressing it

Transferring risk to a third party

Avoiding risk by not engaging in the activity

Attempting to address risk by making it less serious

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?