Information Security model exam

Information Security model exam

University

50 Qs

quiz-placeholder

Similar activities

BTVI - 2204 Cohort 4 - Midterm Exam

BTVI - 2204 Cohort 4 - Midterm Exam

University

45 Qs

Cybersecurity Intro

Cybersecurity Intro

University

45 Qs

Computer Science

Computer Science

University

51 Qs

AHJ: U6 Data Privacy and Security

AHJ: U6 Data Privacy and Security

12th Grade - University

50 Qs

computer networks semester quiz

computer networks semester quiz

University - Professional Development

50 Qs

Year 12 Summative Review - Nov 2022

Year 12 Summative Review - Nov 2022

12th Grade - University

50 Qs

ITSM

ITSM

University

51 Qs

 PNETSEC Final Examination (II-BINS)

PNETSEC Final Examination (II-BINS)

University

50 Qs

Information Security model exam

Information Security model exam

Assessment

Quiz

Computers

University

Hard

Created by

Thomas Chacko

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary reason why organizations need information security?

To improve the speed of internet connectivity

To ensure the confidentiality, integrity, and availability of data

To reduce the cost of computer hardware

To eliminate the need for physical security measures

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of security ensures that data has not been altered or tampered with?

Confidentiality

Integrity

Non-repudiation

Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principle guarantees that the sender of a message cannot deny sending it later?

Confidentiality

Integrity

Non-repudiation

Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves unauthorized individuals secretly monitoring communications or data?

Active attack

Passive attack

Polymorphic virus

Trojan horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a characteristic of a computer virus?

It can replicate itself.

It requires user intervention to spread.

It operates independently without a host file.

It can attach itself to executable programs.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term best describes the study and practice of hiding messages?

Cryptanalysis

Steganography

Cryptography

Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true about a Trojan horse?

It self-replicates across networks.

It appears to perform legitimate tasks but executes malicious activities.

It is a type of active wiretapping device.

It primarily encrypts data for ransom.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?