Information Security Principles

Information Security Principles

University

10 Qs

quiz-placeholder

Similar activities

Database Management

Database Management

12th Grade - University

11 Qs

Ecommerce Security

Ecommerce Security

University

10 Qs

Data Breach Quiz

Data Breach Quiz

University

12 Qs

Cryptography

Cryptography

University

15 Qs

Cyber forensic and security

Cyber forensic and security

University

15 Qs

CHAPTER 1 : Introduction to Network Security

CHAPTER 1 : Introduction to Network Security

University

10 Qs

Cybersecurity and Data Privacy Vocabulary

Cybersecurity and Data Privacy Vocabulary

11th Grade - University

15 Qs

Basic Cybersecurity Tips

Basic Cybersecurity Tips

University

13 Qs

Information Security Principles

Information Security Principles

Assessment

Quiz

Computers

University

Easy

Created by

N M

Used 15+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for in information security?

Control, Information, Availability

Confidentiality, Integrity, Availability

Control, Integrity, Access

Confidentiality, Identity, Access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that demands payment for decryption?

Virus

Trojan

Spyware

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of information assurance?

To ensure data is always available

To monitor network traffic

To maintain confidentiality, integrity, and availability of information

To prevent all types of cyber attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a challenge in information security?

Insider threats

Data encryption

Cloud security

Phishing attacks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of information security leaders in modern organizations?

To implement security tools only

To ensure business operations are secure

To manage IT configurations

To focus solely on compliance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does integrity in the CIA triad refer to?

The speed of data processing

The accessibility of information

The privacy of data

The accuracy and consistency of information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes Advanced Persistent Threats (APTs)?

Short-term attacks that are easy to detect

Long-term targeted attacks that are difficult to detect

Random attacks with no specific target

Attacks that only target mobile devices

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?