MidExam InfoAssuSec2

Quiz
•
Computers
•
University
•
Easy
Jhenice Sacdalan
Used 7+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the Five Information Assurance Pillars?
Confidentiality, Integrity, Availability, Authentication, Authorization
Confidentiality, Integrity, Availability, Authorization, Non-Repudiation
Confidentiality, Integrity, Availability, Authentication, Non-Repudiation
Confidentiality, Integrity, Availability, Authentication, Accountability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main goal of Information Assurance?
To ensure the confidentiality, integrity, and availability of information
To delete all information
To provide unlimited access to information
To restrict access to information
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of Security Countermeasures in Information Assurance?
To slow down information processing
To protect information systems from threats
To expose information to unauthorized parties
To increase vulnerabilities
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does Defense in Depth refer to?
Securing the physical door
Security through layers of a building
Securing only the external perimeter
Securing only the internal part of a building
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is part of the CIA Triangle?
Confidentiality, Integrity, and Authorization
Confidentiality, Integrity, and Authentication
Confidentiality, Integrity, and Accountability
Confidentiality, Integrity, and Availability
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main goal of Non-repudiation?
Proving the legitimacy of a message or data transfer
Ensuring data is accurate and valid
Protecting data from unauthorized changes
Providing undeniable evidence of authenticity and integrity
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are Assets in the context of information security?
Organizational resources being protected
Weaknesses in data confidentiality
Probabilities of threats becoming realities
Parameters implemented to protect data
Create a free account and access millions of resources
Similar Resources on Wayground
50 questions
IAS2-NW3A

Quiz
•
University
50 questions
Data Comms Reviewer for UT2 Part 2

Quiz
•
University
50 questions
AKT test (151-200) Жаңа вариант

Quiz
•
University
50 questions
smkn1

Quiz
•
University
46 questions
CSCI0613 - Course Packet 1

Quiz
•
University
48 questions
OSI Layer

Quiz
•
12th Grade - University
46 questions
CompTIA ITFundamentals CRAM

Quiz
•
6th Grade - University
50 questions
ITE 383: Network Security P2 EXAM

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade