
Information Security Quiz

Quiz
•
Professional Development
•
Professional Development
•
Medium
Alaine Ng
Used 2+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does ISMS stand for?
International Safety Management Standard
Information Security Management System
Integrated Security Management Solution
Information Systems Monitoring Service
Answer explanation
ISMS stands for Information Security Management System, which is a systematic approach to managing sensitive company information, ensuring its confidentiality, integrity, and availability.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT part of the CIA triad?
Confidentiality
Integrity
Availability
Accountability
Answer explanation
The CIA triad consists of Confidentiality, Integrity, and Availability. Accountability, while important in security, is not one of the core components of the triad, making it the correct answer.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
ISMS is only the responsibility of the IT department.
True
False
Answer explanation
The statement is false because Information Security Management Systems (ISMS) involve the entire organization, not just the IT department. All employees play a role in maintaining security practices.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first step in the ISMS lifecycle?
Do
Check
Act
Plan
Answer explanation
The first step in the ISMS lifecycle is 'Plan'. This phase involves establishing the information security management system (ISMS) framework and objectives, setting the foundation for the subsequent steps: Do, Check, and Act.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which regulation relates to personal data protection in Malaysia?
GDPR
PDPA
HIPAA
PCI DSS
Answer explanation
The correct regulation for personal data protection in Malaysia is the PDPA (Personal Data Protection Act). GDPR applies to the EU, HIPAA is for health information in the US, and PCI DSS relates to payment card data security.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An example of a physical security breach is:
Phishing email
Malware attack
Tailgating into secure areas
Password cracking
Answer explanation
Tailgating into secure areas is a physical security breach, as it involves unauthorized individuals gaining access to restricted locations. In contrast, phishing, malware, and password cracking are cyber threats.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a benefit of ISMS?
Enhances operational efficiency
Reduces risk of data breaches
Builds customer trust
All of the above
Answer explanation
ISMS provides multiple benefits, including enhancing operational efficiency, reducing the risk of data breaches, and building customer trust. Therefore, the correct answer is 'All of the above'.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
AWS Certified Cloud Practitioner

Quiz
•
Professional Development
10 questions
PRE TEST - ISO 27001

Quiz
•
Professional Development
10 questions
TEST MODUL 2

Quiz
•
Professional Development
15 questions
Quiz

Quiz
•
Professional Development
16 questions
AWS Cloud Practitioner

Quiz
•
Professional Development
10 questions
Threat Management Roles and Acronyms

Quiz
•
Professional Development
10 questions
Resume

Quiz
•
Professional Development
10 questions
ISO 27001:2022 Clause 9 Performance Evaluation Quiz

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade