
Mod 01 Introduction to Information Security
Authored by Jose Manuel Rios
Computers
University
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
34 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You have excellent technical acumen. Part of your responsibilities where you work include overlooking daily operations as well as analyzing and designing security solutions in a specific area. You encounter a situation that needs to be escalated. Which of the following are you most likely to approach with the situation?
CIO
CISO
Security manager
Security administrator
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Confidentiality
Integrity
Authorization
Authentication
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A visitor is trying to access a military base. The visitor needs to supply their license and enter other personal information via a kiosk. The visitor is eventually allowed to enter the base but is limited to certain areas only. What security principles are being employed? Select two.
Authentication
Authorization
Confidentiality
Accounting
Availability
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes what Della could do to prevent unauthorized parties from viewing sensitive customer information at her retail store?
Use software to encrypt data in a secure database.
Verify the ID of the party requesting access to the data.
Limit access to certain areas once access is granted.
Ensure the data cannot be manipulated or changed.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Evin thinks one of the computer systems where he works may have been compromised. He does not currently have a good way of determining if an unauthorized user logged in successfully. Which of the following can Evin implement that will, going forward, help him identify who logs in?
Authentication
Authorization
Availability
Accounting
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A friend gets a virus and asks if you can help them fix the problem. You boot the computer with a bootable flash drive containing security-related tools and remove the virus. What type of control did you employ?
Deterrent
Preventive
Detective
Corrective
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of security control?
Preventive
Corrective
Directive
Compensating
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
35 questions
SCRATCH
Quiz
•
4th Grade - University
30 questions
IT security - 3
Quiz
•
9th Grade - University
31 questions
Quiz#8: Elements of Film Form
Quiz
•
University
30 questions
Sensor Knowledge Quiz
Quiz
•
5th Grade - University
32 questions
Microsoft Excel - Formulae
Quiz
•
9th Grade - University
30 questions
CN4: ÔN TẬP HK2
Quiz
•
5th Grade - University
29 questions
Kuis ke 5
Quiz
•
University
30 questions
Set Theory Quiz
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade