
MidExam InfoAssuSec2
Authored by Jhenice Sacdalan
Computers
University
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the Five Information Assurance Pillars?
Confidentiality, Integrity, Availability, Authentication, Authorization
Confidentiality, Integrity, Availability, Authorization, Non-Repudiation
Confidentiality, Integrity, Availability, Authentication, Non-Repudiation
Confidentiality, Integrity, Availability, Authentication, Accountability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main goal of Information Assurance?
To ensure the confidentiality, integrity, and availability of information
To delete all information
To provide unlimited access to information
To restrict access to information
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of Security Countermeasures in Information Assurance?
To slow down information processing
To protect information systems from threats
To expose information to unauthorized parties
To increase vulnerabilities
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does Defense in Depth refer to?
Securing the physical door
Security through layers of a building
Securing only the external perimeter
Securing only the internal part of a building
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is part of the CIA Triangle?
Confidentiality, Integrity, and Authorization
Confidentiality, Integrity, and Authentication
Confidentiality, Integrity, and Accountability
Confidentiality, Integrity, and Availability
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main goal of Non-repudiation?
Proving the legitimacy of a message or data transfer
Ensuring data is accurate and valid
Protecting data from unauthorized changes
Providing undeniable evidence of authenticity and integrity
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are Assets in the context of information security?
Organizational resources being protected
Weaknesses in data confidentiality
Probabilities of threats becoming realities
Parameters implemented to protect data
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
50 questions
UH 1
Quiz
•
University
45 questions
Microsoft Excels: Formulas and Functions
Quiz
•
12th Grade - University
50 questions
RIA Revision for Class Test_Set 2
Quiz
•
University
48 questions
Audit Sistem Informasi Quiz UTS Bag_1
Quiz
•
University
50 questions
ICT 201-250
Quiz
•
University
45 questions
Computer Hardware and Software Review
Quiz
•
KG - University
50 questions
VIRUS AND ANTIVIRUS
Quiz
•
10th Grade - University
45 questions
Davinci Resolve 17 Fusion 101
Quiz
•
11th Grade - Professi...
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade