Information Security Quiz

Information Security Quiz

University

21 Qs

quiz-placeholder

Similar activities

Jarkom STMIK MERCUSUAR 01

Jarkom STMIK MERCUSUAR 01

University

20 Qs

The Rise of Intelligent Machines

The Rise of Intelligent Machines

8th Grade - University

18 Qs

ITE TEST 2

ITE TEST 2

University

20 Qs

Skill Competition Quiz 2024

Skill Competition Quiz 2024

10th Grade - University

20 Qs

SOFTWARE 7I

SOFTWARE 7I

7th Grade - University

20 Qs

Spreadsheet Fundamentals - Quiz2

Spreadsheet Fundamentals - Quiz2

University

20 Qs

Algoritma Remedial RPL

Algoritma Remedial RPL

University

20 Qs

Processing- The CPU Quiz

Processing- The CPU Quiz

10th Grade - University

20 Qs

Information Security Quiz

Information Security Quiz

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

ANIKET PAUL

Used 20+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the core objectives of the CIA Triad in Information Security?

Confidentiality, Integrity, and Authentication

Confidentiality, Integrity, and Availability

Authentication, Non-repudiation, and Integrity

Encryption, Decryption, and Key Management

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques ensures Confidentiality in the CIA Triad?

Hashing

Data Masking

Checksum Verification

Digital Signatures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method ensures data Integrity in Information Security?

Encryption

Hashing

Two-Factor Authentication

Digital Signatures

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Authentication in Information Security?

Protecting data from unauthorized changes

Ensuring only authorized users can access a system

Keeping data accessible at all times

Encrypting sensitive information

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Non-repudiation in Information Security?

Preventing unauthorized access

Ensuring that actions or transactions cannot be denied later

Protecting data integrity

Encrypting stored data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of security threat?

Malware

Digital Certificates

Phishing

Buffer Overflow

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of a firewall in network security?

Encrypting stored files

Preventing unauthorized access to a network

Detecting malware on a device

Managing passwords securely

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?