Security

Security

University

9 Qs

quiz-placeholder

Similar activities

uas-siber

uas-siber

University

10 Qs

Internet

Internet

University

11 Qs

ITF+ Value of Data

ITF+ Value of Data

University

10 Qs

ICF-Mechanical-(Theory Quiz-2)

ICF-Mechanical-(Theory Quiz-2)

University

10 Qs

PSSI Chp 1 dan 2

PSSI Chp 1 dan 2

University

12 Qs

TES AWAL MODUL 2

TES AWAL MODUL 2

University

10 Qs

ASAS SAINS KOMPUTER : TINGKATAN 3

ASAS SAINS KOMPUTER : TINGKATAN 3

4th Grade - University

12 Qs

Server Administration- Quiz 1

Server Administration- Quiz 1

12th Grade - University

10 Qs

Security

Security

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Rupinder Kaur

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for in information security?

Confidentiality, Integrity, Authorization

Confidentiality, Integrity, Availability

Confidentiality, Information, Authentication

Confidentiality, Integrity, Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of "defense in depth"?

Using encryption to protect data

Layering multiple security measures to protect assets

Ensuring only authorized users access data

Automating security tasks for efficiency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following ensures data accuracy and completeness over its lifecycle?

Availability

Non-repudiation

Integrity

Confidentiality

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of availability in IT security?

Ensuring data is accessible only to authorized users

Preventing denial-of-service (DoS) attacks

Making systems and data accessible when needed

Monitoring network activity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of ensuring confidentiality?

Two-factor authentication

RAID configurations

Load balancing

Backup and restoration

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an IT threat?

A tool used for encryption

A mechanism for protecting data

A vulnerability in the system

An event that could exploit a vulnerability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of a naturally occurring IT risk?

Hardware failure

Identity theft

Phishing attack

Virus infection

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers