emez

emez

University

29 Qs

quiz-placeholder

Similar activities

Clubs de foot

Clubs de foot

KG - Professional Development

24 Qs

PIn5

PIn5

University

25 Qs

Famous Buildings JEE Paper - 2

Famous Buildings JEE Paper - 2

7th Grade - Professional Development

25 Qs

BRITAIN: COUNTRY AND PEOPLE

BRITAIN: COUNTRY AND PEOPLE

University

25 Qs

Professional Selling - Unit 2 Exam

Professional Selling - Unit 2 Exam

University

25 Qs

QUIZ 8PM 07-07

QUIZ 8PM 07-07

7th Grade - Professional Development

25 Qs

Latihan Bahasa Indonesia

Latihan Bahasa Indonesia

University

25 Qs

Harry Potter

Harry Potter

KG - Professional Development

24 Qs

emez

emez

Assessment

Quiz

Other

University

Practice Problem

Easy

Created by

Fuck Me

Used 6+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. What does "integrity of data" mean?

Ensuring data is accurate and has not been altered

The ability to access data at any time

Protecting data from all external threats

Encrypting data to prevent unauthorized access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the inherent technical features and functions that collectively contribute to an IT infrastructure.

Cybersecurity Framework

Information System Components

Information Security Policy

Security Development Lifecycle

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It refers to the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes.

Data Encryption

Information Security

Network Security

System Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the key components of a security policy?

Rules, roles, responsibilities, and enforcement

Data encryption, passwords, and cloud storage

Backups, recovery plans, and monitoring software

User access, system logs, and firewalls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What best defines a "Threat" in information security?

A flaw in a system's software

A category of objects, persons, or entities that presents a danger to an asset

The probability of a security breach occurring

A set of security policies designed to prevent attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of Risk in the context of information security?

The probability that something unwanted will happen

The presence of a vulnerability in a system

The lack of security measures in an organization

The process of securing computer networks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the critical characteristics of information according to the C.I.A. Triangle?

Control, Integrity, Authentication

Confidentiality, Integrity, Availability

Communication, Identification, Access

Compliance, Investigation, Authorization

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?