IAS REVIEW

IAS REVIEW

University

60 Qs

quiz-placeholder

Similar activities

[ITSECUR] Principles of InfoSec

[ITSECUR] Principles of InfoSec

University

61 Qs

Multimedia Operating Systems Quiz

Multimedia Operating Systems Quiz

University

60 Qs

Algorimt/program-1

Algorimt/program-1

University

62 Qs

Quiz Aplikasi Web - Machine Learning

Quiz Aplikasi Web - Machine Learning

University

60 Qs

Quiz UAS_SP_ Arsitektur dan Organisasi Komputer

Quiz UAS_SP_ Arsitektur dan Organisasi Komputer

University

55 Qs

ĐỀ 4

ĐỀ 4

University

59 Qs

Tầng mạng

Tầng mạng

University

57 Qs

Year 12 2025 Trial HSC Exam Prep

Year 12 2025 Trial HSC Exam Prep

12th Grade - University

65 Qs

IAS REVIEW

IAS REVIEW

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

John Bernie Ruiz

Used 10+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not part of the CIA triad in security objectives?
Confidentiality
Integrity
Accessibility
Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of security objectives?
To provide encryption methods
To define security attacks
To ensure the confidentiality, integrity, and availability of data
To manage network traffic

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does confidentiality ensure in terms of data?
Data is encrypted at all times
Information is not disclosed to unauthorized entities
Only specific files are available to users
Systems perform their intended functions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to ensuring that data is only changed in an authorized manner?
Data integrity
System integrity
Data authenticity
Nonrepudiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does system integrity ensure?
Data is encrypted before transmission
The system performs its intended function without unauthorized interference
Users are authenticated before accessing the system
Messages are received as sent

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes availability in the context of security?
Ensures data is not modified
Prevents unauthorized disclosure of information
Ensures that systems work promptly and services are not denied to authorized users
Traces all system actions to a responsible entity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is authenticity concerned with in a security system?
Data confidentiality
Verifying that users are who they claim to be
Detecting passive attacks
System accessibility

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?