IAS REVIEW

IAS REVIEW

University

60 Qs

quiz-placeholder

Similar activities

COMPUTER SYSTEM ORGANIZATION QUIZ

COMPUTER SYSTEM ORGANIZATION QUIZ

University

60 Qs

Modelagem de Dados

Modelagem de Dados

University

64 Qs

Examen Final en Python

Examen Final en Python

University

62 Qs

ITE 292: Networking Exam

ITE 292: Networking Exam

University

60 Qs

An Ninh Mạng - Phần 1 (1-50)

An Ninh Mạng - Phần 1 (1-50)

University

56 Qs

ИКТ соңғы 60 сұрақ

ИКТ соңғы 60 сұрақ

University

60 Qs

COMPUTER PROGRAMMING 1 (Midterm Examination)

COMPUTER PROGRAMMING 1 (Midterm Examination)

University

62 Qs

Information Security and Risk Management Quiz

Information Security and Risk Management Quiz

University

57 Qs

IAS REVIEW

IAS REVIEW

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

John Bernie Ruiz

Used 10+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not part of the CIA triad in security objectives?
Confidentiality
Integrity
Accessibility
Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of security objectives?
To provide encryption methods
To define security attacks
To ensure the confidentiality, integrity, and availability of data
To manage network traffic

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does confidentiality ensure in terms of data?
Data is encrypted at all times
Information is not disclosed to unauthorized entities
Only specific files are available to users
Systems perform their intended functions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to ensuring that data is only changed in an authorized manner?
Data integrity
System integrity
Data authenticity
Nonrepudiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does system integrity ensure?
Data is encrypted before transmission
The system performs its intended function without unauthorized interference
Users are authenticated before accessing the system
Messages are received as sent

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes availability in the context of security?
Ensures data is not modified
Prevents unauthorized disclosure of information
Ensures that systems work promptly and services are not denied to authorized users
Traces all system actions to a responsible entity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is authenticity concerned with in a security system?
Data confidentiality
Verifying that users are who they claim to be
Detecting passive attacks
System accessibility

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?