25_IAS101_Q2

25_IAS101_Q2

University

25 Qs

quiz-placeholder

Similar activities

Cybersecurity Threats and Prevention Quiz

Cybersecurity Threats and Prevention Quiz

9th Grade - University

20 Qs

Information assurance and security

Information assurance and security

University

25 Qs

Computer Science Quiz

Computer Science Quiz

University

20 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

Multi Factor Authentication

Multi Factor Authentication

University

20 Qs

Device Hardening

Device Hardening

University

20 Qs

INFO MNGT MIDTERM EXAM P1

INFO MNGT MIDTERM EXAM P1

University

20 Qs

25_IAS101_Q2

25_IAS101_Q2

Assessment

Quiz

Computers

University

Hard

Created by

Darrel Fontanilla

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which aspect of information security ensures that data is kept secret and only accessible to authorized users?

  • Confidentiality

  • Integrity

Availability

  • Authenticity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method is most effective for preventing unauthorized modification of data?

Encrypting the data

Message authentication and integrity codes (MAC/MIC)

Regular backups

Installing antivirus software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A 'Logic Bomb' is best described as:

A network worm that spreads rapidly

Malicious code that is triggered by a specific event

A type of password cracker

A form of DNS poisoning

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of IT threat?

Password grabbers

Logic Bombs

Dictionary attack

Network worms

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves tricking a user into providing sensitive information such as passwords?

Phishing

Cross-site scripting (XSS)

SQL Injection

Dictionary attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a typical safeguard against internet security threats?

Monitoring incoming emails

Disabling scripting features in email programs

Installing and configuring file encryption programs

Installing internet security software

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which aspect of security focuses on ensuring that data is available to authorized users when needed?

Integrity

Confidentiality

Availability

Authenticity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?