MidExam InfoAssuSec2

MidExam InfoAssuSec2

University

50 Qs

quiz-placeholder

Similar activities

ULANGAN HARIAN 3 -  SISTEM KOMPUTER

ULANGAN HARIAN 3 - SISTEM KOMPUTER

10th Grade - University

50 Qs

CCNA 2 Module 1-4

CCNA 2 Module 1-4

University

51 Qs

Year 11 January Recap

Year 11 January Recap

University

50 Qs

COMBINATIONAL  DIGITAL CIRCUITS

COMBINATIONAL DIGITAL CIRCUITS

University

55 Qs

LATIHAN UNBK TKJ 2020

LATIHAN UNBK TKJ 2020

University

50 Qs

Final Exam - Introduction to Computing

Final Exam - Introduction to Computing

University

52 Qs

Quiz Infrastruktur TI

Quiz Infrastruktur TI

University

50 Qs

InfoMgt Long Quiz 1

InfoMgt Long Quiz 1

University

50 Qs

MidExam InfoAssuSec2

MidExam InfoAssuSec2

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Jhenice Sacdalan

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Five Information Assurance Pillars?

Confidentiality, Integrity, Availability, Authentication, Authorization

Confidentiality, Integrity, Availability, Authorization, Non-Repudiation

Confidentiality, Integrity, Availability, Authentication, Non-Repudiation

Confidentiality, Integrity, Availability, Authentication, Accountability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Information Assurance?


To ensure the confidentiality, integrity, and availability of information

To delete all information

To provide unlimited access to information

To restrict access to information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of Security Countermeasures in Information Assurance?

To slow down information processing

To protect information systems from threats


To expose information to unauthorized parties


To increase vulnerabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Defense in Depth refer to?

Securing the physical door

Security through layers of a building

Securing only the external perimeter

Securing only the internal part of a building

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is part of the CIA Triangle?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Authentication


Confidentiality, Integrity, and Accountability

Confidentiality, Integrity, and Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Non-repudiation?


Proving the legitimacy of a message or data transfer


Ensuring data is accurate and valid


Protecting data from unauthorized changes

Providing undeniable evidence of authenticity and integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Assets in the context of information security?


Organizational resources being protected

Weaknesses in data confidentiality

Probabilities of threats becoming realities


Parameters implemented to protect data

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?