Search Header Logo

MidExam InfoAssuSec2

Authored by Jhenice Sacdalan

Computers

University

Used 7+ times

MidExam InfoAssuSec2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Five Information Assurance Pillars?

Confidentiality, Integrity, Availability, Authentication, Authorization

Confidentiality, Integrity, Availability, Authorization, Non-Repudiation

Confidentiality, Integrity, Availability, Authentication, Non-Repudiation

Confidentiality, Integrity, Availability, Authentication, Accountability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Information Assurance?


To ensure the confidentiality, integrity, and availability of information

To delete all information

To provide unlimited access to information

To restrict access to information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of Security Countermeasures in Information Assurance?

To slow down information processing

To protect information systems from threats


To expose information to unauthorized parties


To increase vulnerabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Defense in Depth refer to?

Securing the physical door

Security through layers of a building

Securing only the external perimeter

Securing only the internal part of a building

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is part of the CIA Triangle?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Authentication


Confidentiality, Integrity, and Accountability

Confidentiality, Integrity, and Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Non-repudiation?


Proving the legitimacy of a message or data transfer


Ensuring data is accurate and valid


Protecting data from unauthorized changes

Providing undeniable evidence of authenticity and integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Assets in the context of information security?


Organizational resources being protected

Weaknesses in data confidentiality

Probabilities of threats becoming realities


Parameters implemented to protect data

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers