ISC2 - Domain 1- Security Principles

ISC2 - Domain 1- Security Principles

Professional Development

17 Qs

quiz-placeholder

Similar activities

Cybersecurity and IT Infrastructure Quiz

Cybersecurity and IT Infrastructure Quiz

Professional Development

20 Qs

Information Security Controls Quiz

Information Security Controls Quiz

Professional Development

22 Qs

Frontend - CTO Cup

Frontend - CTO Cup

Professional Development

20 Qs

Exam Prep 2

Exam Prep 2

Professional Development

20 Qs

Q1: DATABASE SYSTEM

Q1: DATABASE SYSTEM

Professional Development

18 Qs

ISC2 - Domain 1- Security Principles

ISC2 - Domain 1- Security Principles

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Used 2+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The concept of "secrecy" is most related to which foundational aspect of security?

Availability

Confidentiality

Integrity

Plausibility

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which region enacted comprehensive legislation addressing personal privacy in 2016?

Africa

Asia-Pacific

European Union

United States

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of implementing security controls in the risk management process?

To eliminate all vulnerabilities

To ensure that a cyberattack would be impossible

To increase the level of risk

To mitigate the risk to an acceptable level

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a pickpocket is a threat, what would be their attack vector?

The crowded tourist spot

Their technique and approach

The stolen goods

Tourists

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do companies that offer identity theft insurance manage their own financial risk?

By always honoring payout commitments

By calculating premium payments against potential payouts

By charging low premiums

By restricting the number of claims

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to refer to information that, when combined with other pieces of data, significantly narrows the possibility of association with more individuals?

Limited Access Data (LAD)

Personal Identification Element (PIE)

Personally Identifiable Information (PII)

PII Fusion

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What potential risk can occur when a remote worker's laptop is left unattended or unlocked?

Accidental introduction of unauthorized software with malware

Corrupt workstation due to power outage

Loss of internet connection

Mechanical failure of backup generators

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?