Security

Security

University

9 Qs

quiz-placeholder

Similar activities

Information Security - Final Final Final

Information Security - Final Final Final

University

11 Qs

UAS AUDIT SISTEM INFORMASI

UAS AUDIT SISTEM INFORMASI

University

10 Qs

Information Assurance and Security Midterm Quiz 1

Information Assurance and Security Midterm Quiz 1

University

10 Qs

SMITE 6.0: Get to Know Cybersecurity

SMITE 6.0: Get to Know Cybersecurity

University

11 Qs

QuizChapter2

QuizChapter2

University

11 Qs

CyberCell360

CyberCell360

University

10 Qs

quiz gab 3 29-10-24

quiz gab 3 29-10-24

University

12 Qs

keamanan-sisop

keamanan-sisop

University

6 Qs

Security

Security

Assessment

Quiz

Computers

University

Medium

Created by

Rupinder Kaur

Used 1+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for in information security?

Confidentiality, Integrity, Authorization

Confidentiality, Integrity, Availability

Confidentiality, Information, Authentication

Confidentiality, Integrity, Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of "defense in depth"?

Using encryption to protect data

Layering multiple security measures to protect assets

Ensuring only authorized users access data

Automating security tasks for efficiency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following ensures data accuracy and completeness over its lifecycle?

Availability

Non-repudiation

Integrity

Confidentiality

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of availability in IT security?

Ensuring data is accessible only to authorized users

Preventing denial-of-service (DoS) attacks

Making systems and data accessible when needed

Monitoring network activity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of ensuring confidentiality?

Two-factor authentication

RAID configurations

Load balancing

Backup and restoration

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an IT threat?

A tool used for encryption

A mechanism for protecting data

A vulnerability in the system

An event that could exploit a vulnerability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a naturally occurring IT risk?

Hardware failure

Identity theft

Phishing attack

Virus infection

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves altering data without authorization?

Passive attack

Active attack

Denial of Service (DoS)

Social engineering

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a Distributed Denial of Service (DDoS) attack?

A single source flooding the system with traffic

Multiple sources overwhelming the target system

Unauthorized data access by an individual hacker

Automated scanning for vulnerabilities