Information Security model exam

Information Security model exam

University

50 Qs

quiz-placeholder

Similar activities

Modules 1-2

Modules 1-2

University

53 Qs

Information Technology, the Internet, and You

Information Technology, the Internet, and You

12th Grade - University

46 Qs

Introduction to Computer

Introduction to Computer

University

50 Qs

NILAI KUIS PERTAMA

NILAI KUIS PERTAMA

University - Professional Development

50 Qs

ict 1-50

ict 1-50

University

50 Qs

ICT 151-200

ICT 151-200

University

50 Qs

PHP Basics

PHP Basics

University

54 Qs

Berpikir Komputasi

Berpikir Komputasi

University

50 Qs

Information Security model exam

Information Security model exam

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Thomas Chacko

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary reason why organizations need information security?

To improve the speed of internet connectivity

To ensure the confidentiality, integrity, and availability of data

To reduce the cost of computer hardware

To eliminate the need for physical security measures

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of security ensures that data has not been altered or tampered with?

Confidentiality

Integrity

Non-repudiation

Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principle guarantees that the sender of a message cannot deny sending it later?

Confidentiality

Integrity

Non-repudiation

Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves unauthorized individuals secretly monitoring communications or data?

Active attack

Passive attack

Polymorphic virus

Trojan horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a characteristic of a computer virus?

It can replicate itself.

It requires user intervention to spread.

It operates independently without a host file.

It can attach itself to executable programs.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term best describes the study and practice of hiding messages?

Cryptanalysis

Steganography

Cryptography

Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true about a Trojan horse?

It self-replicates across networks.

It appears to perform legitimate tasks but executes malicious activities.

It is a type of active wiretapping device.

It primarily encrypts data for ransom.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers