Information Assurance and Security Quiz

Information Assurance and Security Quiz

University

40 Qs

quiz-placeholder

Similar activities

ITN 263 Chapter 5

ITN 263 Chapter 5

University - Professional Development

40 Qs

digital fluency - Test

digital fluency - Test

University

40 Qs

Security

Security

University

37 Qs

SP101_CQ2

SP101_CQ2

University

40 Qs

operating system

operating system

University

40 Qs

Identity Theft and Data Protection Quiz

Identity Theft and Data Protection Quiz

University

45 Qs

Internet of Things (IoT) Security Quiz

Internet of Things (IoT) Security Quiz

University

37 Qs

Unit 7 to 10

Unit 7 to 10

University

40 Qs

Information Assurance and Security Quiz

Information Assurance and Security Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Mark Pena

Used 4+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of Information Assurance (IA)?

To improve system performance

To ensure information is protected and available

To create complex passwords

To install firewalls

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a component of Information Assurance?

Risk Management

System Administration

Data Backup and Recovery

Social Engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Information Security (IS) focuses primarily on:

Protecting physical infrastructure

Managing cybersecurity risks

Enhancing internet speed

Installing software updates

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between IA and IS?

IA is broader and includes policies, while IS focuses on protecting data

IS is broader than IA

IA deals only with hacking prevention

IS includes physical security

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes Confidentiality in the CIA Triad?

Ensuring data is available when needed

Keeping information secret from unauthorized users

Preventing all cyber attacks

Using strong passwords

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can Integrity be ensured in cybersecurity?

Encrypting files before storing them

Using hash functions to verify data

Preventing unauthorized access

Regularly changing passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a real-world example of Availability?

A company using backup servers to prevent downtime

Encrypting all company emails

Using a VPN to access secure sites

Installing antivirus software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?