Mod 2 Risk Adversity Trust

Mod 2 Risk Adversity Trust

9th - 12th Grade

29 Qs

quiz-placeholder

Similar activities

Keamanan Data dan Informasi

Keamanan Data dan Informasi

9th Grade

25 Qs

AI Knowledge Quiz

AI Knowledge Quiz

9th Grade

30 Qs

Keamanan Data

Keamanan Data

9th Grade

25 Qs

Cambridge Technicals in IT - Unit 02 - LO3.6

Cambridge Technicals in IT - Unit 02 - LO3.6

11th - 12th Grade

25 Qs

Multiple Choice Questions: Programming

Multiple Choice Questions: Programming

9th Grade

30 Qs

Cybersecurity Quiz

Cybersecurity Quiz

12th Grade

30 Qs

INFORMATIKA - Informatika dan Keterampilan Generik

INFORMATIKA - Informatika dan Keterampilan Generik

10th Grade

25 Qs

Final Exam: Computer Science Principles

Final Exam: Computer Science Principles

12th Grade

24 Qs

Mod 2 Risk Adversity Trust

Mod 2 Risk Adversity Trust

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Medium

Created by

PJ Johnson

Used 2+ times

FREE Resource

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes why information assets must be identified for cybersecurity purposes?

Because you cannot protect what you have not identified

Because you should only protect what you have identified

Because you can only identify some information assets

Because you should only identify those information assets that are the most important

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the purpose of a data classification system for cybersecurity?

To ensure filenames are compliant with the naming policy rules

To identify information assets and protect them from a loss of confidentiality, integrity and availability

To describe all possible vulnerabilities in the system

To initiate a threat assessment protocol

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Inappropriate file access to, or disclosure of, protectively marked information, whether by an adversary or accidentally, is a loss of:

Availability

Confidentiality

Integrity

Availability and Confidentiality

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

User error resulting in the access to, modification of, and disclosure confidential information assets represents a loss of:

Confidentiality

Confidentiality and Integrity

Availability and Integrity

Availability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe ensuring that authorized parties are able to access the information when it is needed?

Confidentiality

Integrity

Availability

Asset identification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a circumstance or event with the potential to have an adverse effect on organizational operations?

Threat

Vulnerability

Attack

Exploit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?

Threat

Vulnerability

Attack

Exploit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?