
Five pillar of information security
Authored by hydie cruz
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security property ensures that information is ready for use and at the required performance level when needed?
Availability
Authentication
Confidentiality
Integrity
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of 'authentication' as a security property?
To ensure data remains unchanged and accurate
To limit access to sensitive information
To prevent users from denying their actions
To verify the users are who they claim to be
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A scenario where a failure in confidential involves in data access
A programmer debugging code.
A system administrator backing up a database.
An authorized employee accessing their own salary information.
An authorized user accessing data they are not permitted to view.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An company is implementing measures to protect confidential information. Which of the following is a comprehensive approach that addresses various aspects of confidentiality?
Combining information classification, secure storage, security policies, and user education.
Implementing a strict password policy for all user accounts.
Installing the latest antivirus software on all computers.
Restricting physical access to the server room.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which describes the primary purpose of encrypting sensitive data, both at rest and in transit, in the context of information confidentiality?
To ensure data integrity during transmission
To improve the speed of data access for authorized users
To prevent unauthorized access to the data
To reduce the storage space required for the data
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which action would NOT be considered a best practice for maintaining information confidentiality?
Ensuring all employees undergo security awareness training
Regular updating security policies based on new threats
Storing all documents without classification to simplify access
Using encryption for sensitive data at rest and in transit
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which data masking technique replaces sensitive data with similar, but non-sensitive data?
Encryption
Substitution
Shuffling
Tokenization
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
1.1.1 The structure and function of the processor
Quiz
•
11th Grade - University
10 questions
Planning and Implementation of Information Security
Quiz
•
University
18 questions
CIS2303 Week 4_5 Ch_3
Quiz
•
University
20 questions
Software Engineering Quiz 1
Quiz
•
University
20 questions
QUIZ BAB 4: SISTEM OPERASI
Quiz
•
8th Grade - University
10 questions
Machine Learning (Introduction)
Quiz
•
University
20 questions
Round 1 ( RHA Learner Contest )
Quiz
•
University
11 questions
Determining System Requirements
Quiz
•
University
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
Discover more resources for Computers
20 questions
Disney Trivia
Quiz
•
University
7 questions
Fragments, Run-ons, and Complete Sentences
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
10 questions
DNA Structure and Replication: Crash Course Biology
Interactive video
•
11th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
20 questions
Implicit vs. Explicit
Quiz
•
6th Grade - University
14 questions
Ch.3_TEACHER-led
Quiz
•
University
7 questions
Comparing Fractions
Interactive video
•
1st Grade - University