Which statement describes why information assets must be identified for cybersecurity purposes?
Mod 2 Risk Adversity Trust

Quiz
•
Information Technology (IT)
•
9th - 12th Grade
•
Medium
PJ Johnson
Used 2+ times
FREE Resource
29 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Because you cannot protect what you have not identified
Because you should only protect what you have identified
Because you can only identify some information assets
Because you should only identify those information assets that are the most important
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement describes the purpose of a data classification system for cybersecurity?
To ensure filenames are compliant with the naming policy rules
To identify information assets and protect them from a loss of confidentiality, integrity and availability
To describe all possible vulnerabilities in the system
To initiate a threat assessment protocol
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Inappropriate file access to, or disclosure of, protectively marked information, whether by an adversary or accidentally, is a loss of:
Availability
Confidentiality
Integrity
Availability and Confidentiality
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
User error resulting in the access to, modification of, and disclosure confidential information assets represents a loss of:
Confidentiality
Confidentiality and Integrity
Availability and Integrity
Availability
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used to describe ensuring that authorized parties are able to access the information when it is needed?
Confidentiality
Integrity
Availability
Asset identification
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term refers to a circumstance or event with the potential to have an adverse effect on organizational operations?
Threat
Vulnerability
Attack
Exploit
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term refers to a weakness in an information system, system security procedures, internal controls, or implementation?
Threat
Vulnerability
Attack
Exploit
Create a free account and access millions of resources
Similar Resources on Quizizz
25 questions
Cambridge Technicals in IT - Unit 02 - LO6.1

Quiz
•
11th - 12th Grade
25 questions
Dom. Reg Morning 9:45am . Final Exam Living I.T. Era

Quiz
•
12th Grade
25 questions
Keamanan Data

Quiz
•
9th Grade
29 questions
CSF Practice - Chapter 4 to 7

Quiz
•
9th - 12th Grade
31 questions
Soal Keamanan Jaringan

Quiz
•
12th Grade - University
32 questions
CSF Chapter 6 - 2024

Quiz
•
9th - 12th Grade
30 questions
Cybersecurity Quiz

Quiz
•
12th Grade
25 questions
INFORMATIKA - Informatika dan Keterampilan Generik

Quiz
•
10th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University