MidExam InfoAssuSec2

MidExam InfoAssuSec2

University

50 Qs

quiz-placeholder

Similar activities

UAS BSD 1

UAS BSD 1

University

45 Qs

Bisnis Online

Bisnis Online

University

50 Qs

Latihan UNBK TKJ 2019

Latihan UNBK TKJ 2019

10th Grade - University

50 Qs

VOIP XII

VOIP XII

1st Grade - University

50 Qs

XIRPL2_PASQUIZZ

XIRPL2_PASQUIZZ

1st Grade - Professional Development

50 Qs

Digital Marketing Test 1

Digital Marketing Test 1

University

50 Qs

Corel Draw

Corel Draw

University

47 Qs

HPC 3 - Applied Business Tools and Technologies w/ Lab Midterm E

HPC 3 - Applied Business Tools and Technologies w/ Lab Midterm E

University

52 Qs

MidExam InfoAssuSec2

MidExam InfoAssuSec2

Assessment

Quiz

Computers

University

Easy

Created by

Jhenice Sacdalan

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Five Information Assurance Pillars?

Confidentiality, Integrity, Availability, Authentication, Authorization

Confidentiality, Integrity, Availability, Authorization, Non-Repudiation

Confidentiality, Integrity, Availability, Authentication, Non-Repudiation

Confidentiality, Integrity, Availability, Authentication, Accountability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Information Assurance?


To ensure the confidentiality, integrity, and availability of information

To delete all information

To provide unlimited access to information

To restrict access to information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of Security Countermeasures in Information Assurance?

To slow down information processing

To protect information systems from threats


To expose information to unauthorized parties


To increase vulnerabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Defense in Depth refer to?

Securing the physical door

Security through layers of a building

Securing only the external perimeter

Securing only the internal part of a building

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is part of the CIA Triangle?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Authentication


Confidentiality, Integrity, and Accountability

Confidentiality, Integrity, and Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Non-repudiation?


Proving the legitimacy of a message or data transfer


Ensuring data is accurate and valid


Protecting data from unauthorized changes

Providing undeniable evidence of authenticity and integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Assets in the context of information security?


Organizational resources being protected

Weaknesses in data confidentiality

Probabilities of threats becoming realities


Parameters implemented to protect data

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?