T2 &U2 FT1_IS Quiz

T2 &U2 FT1_IS Quiz

University

25 Qs

quiz-placeholder

Similar activities

SYO 701 EDR Module FC

SYO 701 EDR Module FC

University

20 Qs

PROFIS203 Endterm Quiz #3

PROFIS203 Endterm Quiz #3

University

20 Qs

Week 11 - Stategy & Planning

Week 11 - Stategy & Planning

University

20 Qs

security+ (601)

security+ (601)

9th Grade - Professional Development

20 Qs

PL-300 Part II

PL-300 Part II

University

20 Qs

Information and Communication Technology Security - Pre-Test

Information and Communication Technology Security - Pre-Test

University

20 Qs

Online Privacy

Online Privacy

University

20 Qs

network security-1

network security-1

12th Grade - University

20 Qs

T2 &U2 FT1_IS Quiz

T2 &U2 FT1_IS Quiz

Assessment

Quiz

Computers

University

Easy

Created by

NALLARASAN V

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a primary goal of the NSTISSC Security Model?

Increase sales

Ensure data confidentiality, integrity, and availability

Promote open access to data

Reduce software costs

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is "Confidentiality" in Information Security?

Making sure data is accurate

Protecting data from unauthorized access

Ensuring data is available when needed

Sharing information with everyone

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is considered part of the "People" component in an information system?

Computers

Software applications

End users and administrators

Network cables

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which SDLC phase focuses on converting design into actual code?

Design

Implementation

Testing

Maintenance

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes "Availability" in the context of Information Security?

Ensuring data is only available to hackers

Making sure data is accessible to authorized users when needed

Encrypting all data

Deleting unnecessary data

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which phase in the Security SDLC involves monitoring and maintaining security measures?

Design

Implementation

Maintenance

Testing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the role of "Policies" in securing an information system?

They are optional guidelines

They provide a framework for managing security practices

They slow down system performance

They replace hardware security measures

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?