Information Security Quiz

Information Security Quiz

Professional Development

15 Qs

quiz-placeholder

Similar activities

Angkasa Pura 2 - Project Management

Angkasa Pura 2 - Project Management

Professional Development

13 Qs

Review on Project Management Concepts

Review on Project Management Concepts

Professional Development

10 Qs

Security Officer Induction

Security Officer Induction

Professional Development

10 Qs

Project Integration Management

Project Integration Management

Professional Development

15 Qs

CISM Chapter 1

CISM Chapter 1

Professional Development

10 Qs

Online eBPLS Users Training Quiz (Day 1)

Online eBPLS Users Training Quiz (Day 1)

Professional Development

10 Qs

Awareness ISO 27K

Awareness ISO 27K

Professional Development

15 Qs

CISSP DOMAIN 1 (Security and Risk Management)

CISSP DOMAIN 1 (Security and Risk Management)

Professional Development

10 Qs

Information Security Quiz

Information Security Quiz

Assessment

Quiz

Professional Development

Professional Development

Medium

Created by

Alaine Ng

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ISMS stand for?

International Safety Management Standard

Information Security Management System

Integrated Security Management Solution

Information Systems Monitoring Service

Answer explanation

ISMS stands for Information Security Management System, which is a systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT part of the CIA triad?

Confidentiality

Integrity

Availability

Accountability

Answer explanation

The CIA triad consists of Confidentiality, Integrity, and Availability. Accountability, while important in security, is not one of the core components of the triad, making it the correct answer.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ISMS is only the responsibility of the IT department.

True

False

Answer explanation

The statement is false because Information Security Management Systems (ISMS) involve the entire organization, not just the IT department. All employees play a role in maintaining security practices.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in the ISMS lifecycle?

Do

Check

Act

Plan

Answer explanation

The first step in the ISMS lifecycle is 'Plan'. This phase involves establishing the information security management system (ISMS) framework and objectives, setting the foundation for the subsequent steps: Do, Check, and Act.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which regulation relates to personal data protection in Malaysia?

GDPR

PDPA

HIPAA

PCI DSS

Answer explanation

The correct regulation for personal data protection in Malaysia is the PDPA (Personal Data Protection Act). GDPR applies to the EU, HIPAA is for health information in the US, and PCI DSS relates to payment card data security.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An example of a physical security breach is:

Phishing email

Malware attack

Tailgating into secure areas

Password cracking

Answer explanation

Tailgating into secure areas is a physical security breach, as it involves unauthorized individuals gaining access to restricted locations. In contrast, phishing, malware, and password cracking are cyber threats.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a benefit of ISMS?

Enhances operational efficiency

Reduces risk of data breaches

Builds customer trust

All of the above

Answer explanation

ISMS provides multiple benefits, including enhancing operational efficiency, reducing the risk of data breaches, and building customer trust. Therefore, the correct answer is 'All of the above'.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?