Information Assurance and Security Quiz

Information Assurance and Security Quiz

University

40 Qs

quiz-placeholder

Similar activities

Authentication and Security Protocols

Authentication and Security Protocols

University

35 Qs

Security Part 2( Technical Diploma)

Security Part 2( Technical Diploma)

University

35 Qs

Quiz ( SIL )

Quiz ( SIL )

University

45 Qs

TestOut Quiz CMT+ - G/H/I

TestOut Quiz CMT+ - G/H/I

11th Grade - University

40 Qs

IT213 Final Exam

IT213 Final Exam

University

40 Qs

C&SE PRE-KNOWLEDGE SURVEY (A+ 1102-CORE 2)

C&SE PRE-KNOWLEDGE SURVEY (A+ 1102-CORE 2)

University - Professional Development

40 Qs

Chapter	9.	Physical	Security	and	Authentication Models

Chapter 9. Physical Security and Authentication Models

University

35 Qs

Understanding Security and Maintenance

Understanding Security and Maintenance

8th Grade - University

40 Qs

Information Assurance and Security Quiz

Information Assurance and Security Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Mark Pena

Used 4+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of Information Assurance (IA)?

To improve system performance

To ensure information is protected and available

To create complex passwords

To install firewalls

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a component of Information Assurance?

Risk Management

System Administration

Data Backup and Recovery

Social Engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information Security (IS) focuses primarily on:

Protecting physical infrastructure

Managing cybersecurity risks

Enhancing internet speed

Installing software updates

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between IA and IS?

IA is broader and includes policies, while IS focuses on protecting data

IS is broader than IA

IA deals only with hacking prevention

IS includes physical security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes Confidentiality in the CIA Triad?

Ensuring data is available when needed

Keeping information secret from unauthorized users

Preventing all cyber attacks

Using strong passwords

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can Integrity be ensured in cybersecurity?

Encrypting files before storing them

Using hash functions to verify data

Preventing unauthorized access

Regularly changing passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a real-world example of Availability?

A company using backup servers to prevent downtime

Encrypting all company emails

Using a VPN to access secure sites

Installing antivirus software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?