Search Header Logo

Mod 01 Introduction to Information Security

Authored by Jose Manuel Rios

Computers

University

Used 7+ times

Mod 01 Introduction to Information Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You have excellent technical acumen. Part of your responsibilities where you work include overlooking daily operations as well as analyzing and designing security solutions in a specific area. You encounter a situation that needs to be escalated. Which of the following are you most likely to approach with the situation?

CIO

CISO

Security manager

Security administrator

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Confidentiality

Integrity

Authorization

Authentication

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A visitor is trying to access a military base. The visitor needs to supply their license and enter other personal information via a kiosk. The visitor is eventually allowed to enter the base but is limited to certain areas only. What security principles are being employed? Select two.

Authentication

Authorization

Confidentiality

Accounting

Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes what Della could do to prevent unauthorized parties from viewing sensitive customer information at her retail store?

Use software to encrypt data in a secure database.

Verify the ID of the party requesting access to the data.

Limit access to certain areas once access is granted.

Ensure the data cannot be manipulated or changed.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Evin thinks one of the computer systems where he works may have been compromised. He does not currently have a good way of determining if an unauthorized user logged in successfully. Which of the following can Evin implement that will, going forward, help him identify who logs in?

Authentication

Authorization

Availability

Accounting

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A friend gets a virus and asks if you can help them fix the problem. You boot the computer with a bootable flash drive containing security-related tools and remove the virus. What type of control did you employ?

Deterrent

Preventive

Detective

Corrective

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of security control?

Preventive

Corrective

Directive

Compensating

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?