IAS REVIEW

IAS REVIEW

University

60 Qs

quiz-placeholder

Similar activities

Multiple Choice Study Guide - InfoSec

Multiple Choice Study Guide - InfoSec

University

64 Qs

COMPUTER SYSTEM ORGANIZATION QUIZ

COMPUTER SYSTEM ORGANIZATION QUIZ

University

60 Qs

ENSA Module 9 - 12

ENSA Module 9 - 12

University

61 Qs

Latihan AAS Ganjil kls 8

Latihan AAS Ganjil kls 8

8th Grade - University

60 Qs

PRELIM EXAM_INTERNET RESEARCH FOR BUSINESS

PRELIM EXAM_INTERNET RESEARCH FOR BUSINESS

University

55 Qs

Information Security and Risk Management Quiz

Information Security and Risk Management Quiz

University

57 Qs

OOP- Quiz #1

OOP- Quiz #1

University

55 Qs

 COMPUTER SYSYTEMS SERVICING

COMPUTER SYSYTEMS SERVICING

10th Grade - University

55 Qs

IAS REVIEW

IAS REVIEW

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

John Bernie Ruiz

Used 10+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not part of the CIA triad in security objectives?
Confidentiality
Integrity
Accessibility
Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of security objectives?
To provide encryption methods
To define security attacks
To ensure the confidentiality, integrity, and availability of data
To manage network traffic

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does confidentiality ensure in terms of data?
Data is encrypted at all times
Information is not disclosed to unauthorized entities
Only specific files are available to users
Systems perform their intended functions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to ensuring that data is only changed in an authorized manner?
Data integrity
System integrity
Data authenticity
Nonrepudiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does system integrity ensure?
Data is encrypted before transmission
The system performs its intended function without unauthorized interference
Users are authenticated before accessing the system
Messages are received as sent

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes availability in the context of security?
Ensures data is not modified
Prevents unauthorized disclosure of information
Ensures that systems work promptly and services are not denied to authorized users
Traces all system actions to a responsible entity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is authenticity concerned with in a security system?
Data confidentiality
Verifying that users are who they claim to be
Detecting passive attacks
System accessibility

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?