Information Security Management Ch 8

Information Security Management Ch 8

12th Grade

11 Qs

quiz-placeholder

Similar activities

Lesson 3: Impact of IT systems

Lesson 3: Impact of IT systems

9th - 12th Grade

15 Qs

AP CK CyberSecurity Unit 5

AP CK CyberSecurity Unit 5

12th Grade

10 Qs

Lesson 6: Criminal Use

Lesson 6: Criminal Use

9th - 12th Grade

15 Qs

Lesson 1: System Attacks and External Threats

Lesson 1: System Attacks and External Threats

9th - 12th Grade

15 Qs

Lesson 5: Data Protection

Lesson 5: Data Protection

9th - 12th Grade

15 Qs

Lesson 2: Internal Threats and Impacts

Lesson 2: Internal Threats and Impacts

9th - 12th Grade

15 Qs

Lesson 1: Shared Data

Lesson 1: Shared Data

9th - 12th Grade

15 Qs

ICT and Multimedia Quiz

ICT and Multimedia Quiz

12th Grade - University

14 Qs

Information Security Management Ch 8

Information Security Management Ch 8

Assessment

Quiz

Information Technology (IT)

12th Grade

Medium

Created by

Giorgi Basilaia

Used 3+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the ISO/IEC 27002 standard?

To establish a framework for financial reporting

To offer a detailed technical guide for software development

To outline the principles of project management

To provide a common basis for developing organizational security standards

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a key principle of access control?

Data encryption

Least privilege

Separation of duties

Need to know

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'benchmarking' refer to in InfoSec?

Auditing user access rights

Comparing organizational performance against standards

Creating new security policies

Implementing security technologies

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a key advantage of NIST documents?

They are outdated and not widely used

They are free and widely reviewed

They are only available to government agencies

They focus solely on technical controls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of access control?

Deterrent

Compensating

Descriptive

Directive

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'accountability' refer to in access control?

The classification of data

The enforcement of security policies

The documentation of user activities

The process of identifying users

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method for ensuring data integrity?

Data masking

Hashing

Encryption

Access control

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)