T2 &U2 FT1_IS Quiz

T2 &U2 FT1_IS Quiz

University

25 Qs

quiz-placeholder

Similar activities

Round 1 ( RHA Learner Contest )

Round 1 ( RHA Learner Contest )

University

20 Qs

Python MCQ

Python MCQ

University

20 Qs

Network topologies

Network topologies

8th Grade - University

20 Qs

WML & WAP

WML & WAP

University

20 Qs

Software Engineering Quiz 1

Software Engineering Quiz 1

University

20 Qs

Arduino Loop

Arduino Loop

2nd Grade - University

20 Qs

QUIZ BAB 4: SISTEM OPERASI

QUIZ BAB 4: SISTEM OPERASI

8th Grade - University

20 Qs

INTERNET

INTERNET

University

20 Qs

T2 &U2 FT1_IS Quiz

T2 &U2 FT1_IS Quiz

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

NALLARASAN V

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a primary goal of the NSTISSC Security Model?

Increase sales

Ensure data confidentiality, integrity, and availability

Promote open access to data

Reduce software costs

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is "Confidentiality" in Information Security?

Making sure data is accurate

Protecting data from unauthorized access

Ensuring data is available when needed

Sharing information with everyone

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is considered part of the "People" component in an information system?

Computers

Software applications

End users and administrators

Network cables

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which SDLC phase focuses on converting design into actual code?

Design

Implementation

Testing

Maintenance

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes "Availability" in the context of Information Security?

Ensuring data is only available to hackers

Making sure data is accessible to authorized users when needed

Encrypting all data

Deleting unnecessary data

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which phase in the Security SDLC involves monitoring and maintaining security measures?

Design

Implementation

Maintenance

Testing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the role of "Policies" in securing an information system?

They are optional guidelines

They provide a framework for managing security practices

They slow down system performance

They replace hardware security measures

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?