Security

Security

University

9 Qs

quiz-placeholder

Similar activities

SMITE 6.0: Get to Know Cybersecurity

SMITE 6.0: Get to Know Cybersecurity

University

11 Qs

ITBP301_Chapter 02

ITBP301_Chapter 02

University

10 Qs

QuizChapter2

QuizChapter2

University

11 Qs

Security

Security

12th Grade - University

12 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

EC335 - Quiz 1

EC335 - Quiz 1

University

10 Qs

Database Design & Development- Testing & Security 1

Database Design & Development- Testing & Security 1

University

12 Qs

CN3303 - Lecture 9: Cloud Security threats

CN3303 - Lecture 9: Cloud Security threats

University

10 Qs

Security

Security

Assessment

Quiz

Computers

University

Medium

Created by

Rupinder Kaur

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for in information security?

Confidentiality, Integrity, Authorization

Confidentiality, Integrity, Availability

Confidentiality, Information, Authentication

Confidentiality, Integrity, Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of "defense in depth"?

Using encryption to protect data

Layering multiple security measures to protect assets

Ensuring only authorized users access data

Automating security tasks for efficiency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following ensures data accuracy and completeness over its lifecycle?

Availability

Non-repudiation

Integrity

Confidentiality

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of availability in IT security?

Ensuring data is accessible only to authorized users

Preventing denial-of-service (DoS) attacks

Making systems and data accessible when needed

Monitoring network activity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of ensuring confidentiality?

Two-factor authentication

RAID configurations

Load balancing

Backup and restoration

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an IT threat?

A tool used for encryption

A mechanism for protecting data

A vulnerability in the system

An event that could exploit a vulnerability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a naturally occurring IT risk?

Hardware failure

Identity theft

Phishing attack

Virus infection

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves altering data without authorization?

Passive attack

Active attack

Denial of Service (DoS)

Social engineering

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a Distributed Denial of Service (DDoS) attack?

A single source flooding the system with traffic

Multiple sources overwhelming the target system

Unauthorized data access by an individual hacker

Automated scanning for vulnerabilities