PRELIM Review - ITON

PRELIM Review - ITON

University

18 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals Quiz

Cybersecurity Fundamentals Quiz

10th Grade - University

15 Qs

Operating System Security Quiz

Operating System Security Quiz

University

20 Qs

038_Mobile Device Vulnerabilities – CompTIA Security+ SY0-701

038_Mobile Device Vulnerabilities – CompTIA Security+ SY0-701

9th Grade - University

20 Qs

Computer Security Measure

Computer Security Measure

11th Grade - University

19 Qs

SecOps Quiz

SecOps Quiz

University

16 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

DBMS

DBMS

University

15 Qs

ICT (Configure User Access)

ICT (Configure User Access)

University

15 Qs

PRELIM Review - ITON

PRELIM Review - ITON

Assessment

Quiz

Computers

University

Hard

Created by

Mary Jane Somao-i

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of an Information Security Management System (ISMS)?

To align security controls with organizational risk tolerance

To develop a comprehensive threat management system

To establish effective controls for asset confidentiality

To ensure asset availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which model is primarily focused on confidentiality in access control?

Access Matrix Model

Bell-LaPadula Model

Clark & Wilson Model

Biba Model

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the 'CIA triad' stand for in information security?

Control, Information, Availability

Confidentiality, Information, Access

Control, Integrity, Access

Confidentiality, Integrity, Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of the ISO/IEC 27001 framework?

Plan-Do-Check-Act model

Risk assessment

Incident response

Data encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a risk assessment matrix?

To evaluate the effectiveness of security policies

To establish security roles and responsibilities

To categorize risks based on probability and impact

To monitor user behavior

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which policy regulates user behavior towards a system or network?

Network Policy

Acceptance User Policy

User Account Policy

Remote Access Policy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main focus of the Biba Integrity Model?

Controlling access to sensitive data

Maintaining confidentiality

Ensuring data availability

Preventing unauthorized modifications

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?