emez

emez

University

29 Qs

quiz-placeholder

Similar activities

Accounting - Chapter 13

Accounting - Chapter 13

KG - University

24 Qs

E-Goverment

E-Goverment

University

27 Qs

CLOUD COMPUTING

CLOUD COMPUTING

University

25 Qs

Internet Technology - DE

Internet Technology - DE

University

30 Qs

Q3. DPMS

Q3. DPMS

University

30 Qs

CBT Revision 2

CBT Revision 2

University

24 Qs

ISYS3439 - Cyber GRC

ISYS3439 - Cyber GRC

University

26 Qs

HIS Lesson 13-15

HIS Lesson 13-15

KG - University

30 Qs

emez

emez

Assessment

Quiz

Other

University

Easy

Created by

Fuck Me

Used 6+ times

FREE Resource

29 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. What does "integrity of data" mean?

Ensuring data is accurate and has not been altered

The ability to access data at any time

Protecting data from all external threats

Encrypting data to prevent unauthorized access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the inherent technical features and functions that collectively contribute to an IT infrastructure.

Cybersecurity Framework

Information System Components

Information Security Policy

Security Development Lifecycle

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It refers to the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes.

Data Encryption

Information Security

Network Security

System Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the key components of a security policy?

Rules, roles, responsibilities, and enforcement

Data encryption, passwords, and cloud storage

Backups, recovery plans, and monitoring software

User access, system logs, and firewalls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What best defines a "Threat" in information security?

A flaw in a system's software

A category of objects, persons, or entities that presents a danger to an asset

The probability of a security breach occurring

A set of security policies designed to prevent attacks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of Risk in the context of information security?

The probability that something unwanted will happen

The presence of a vulnerability in a system

The lack of security measures in an organization

The process of securing computer networks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the critical characteristics of information according to the C.I.A. Triangle?

Control, Integrity, Authentication

Confidentiality, Integrity, Availability

Communication, Identification, Access

Compliance, Investigation, Authorization

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?