Information Security Principles

Information Security Principles

University

10 Qs

quiz-placeholder

Similar activities

3C QUIZ

3C QUIZ

University

13 Qs

ISA 1 - QUIZ 2

ISA 1 - QUIZ 2

University

10 Qs

Database Management

Database Management

12th Grade - University

11 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Cyber forensic and security

Cyber forensic and security

University

15 Qs

CHAPTER 1 : Introduction to Network Security

CHAPTER 1 : Introduction to Network Security

University

10 Qs

Cybersecurity Fundamentals Quiz

Cybersecurity Fundamentals Quiz

10th Grade - University

15 Qs

CBY 207 Module 1 -Quiz1

CBY 207 Module 1 -Quiz1

University

10 Qs

Information Security Principles

Information Security Principles

Assessment

Quiz

Computers

University

Easy

Created by

N M

Used 17+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for in information security?

Control, Information, Availability

Confidentiality, Integrity, Availability

Control, Integrity, Access

Confidentiality, Identity, Access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that demands payment for decryption?

Virus

Trojan

Spyware

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of information assurance?

To ensure data is always available

To monitor network traffic

To maintain confidentiality, integrity, and availability of information

To prevent all types of cyber attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a challenge in information security?

Insider threats

Data encryption

Cloud security

Phishing attacks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of information security leaders in modern organizations?

To implement security tools only

To ensure business operations are secure

To manage IT configurations

To focus solely on compliance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does integrity in the CIA triad refer to?

The speed of data processing

The accessibility of information

The privacy of data

The accuracy and consistency of information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes Advanced Persistent Threats (APTs)?

Short-term attacks that are easy to detect

Long-term targeted attacks that are difficult to detect

Random attacks with no specific target

Attacks that only target mobile devices

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?