QUIZ 2: Fundamental Concepts of IAS 2

QUIZ 2: Fundamental Concepts of IAS 2

University

15 Qs

quiz-placeholder

Similar activities

Security Principles Quiz

Security Principles Quiz

University

15 Qs

KiCA Quizzes

KiCA Quizzes

KG - University

12 Qs

CNET236 Chapt 14 - Config Authorization & Authentication

CNET236 Chapt 14 - Config Authorization & Authentication

University

10 Qs

OWASP TOP 10 QUIZ (EXPERIMENTAL GROUP)

OWASP TOP 10 QUIZ (EXPERIMENTAL GROUP)

University

12 Qs

 WIRELESS

WIRELESS

University

20 Qs

DC&E Lesson 5 Quiz

DC&E Lesson 5 Quiz

6th Grade - University

15 Qs

Cyber Security Awareness Quiz

Cyber Security Awareness Quiz

University

10 Qs

Testout Security 4.1-4.2

Testout Security 4.1-4.2

11th Grade - University

20 Qs

QUIZ 2: Fundamental Concepts of IAS 2

QUIZ 2: Fundamental Concepts of IAS 2

Assessment

Quiz

Other

University

Easy

Created by

Brian John Q. Rodriguez

Used 22+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is a set of models, methods, and security principles that align with the organizational objectives and keeps the organization safe from cyber threats.

Controls

Security Architecture

Defense in Depth

CIA Triangle

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These are the three layers of information security that are designed and implemented.

Policies, People and Technology (PPT)

CIA Triangle

Security and Operational Controls

Defense in Depth

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These are parameters implemented to protect various forms of data and infrastructure that is important in an organization.

Controls

Security Architecture

Defense in Depth

CIA Triangle

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is the concept used in information security in which multiple layers of security controls are placed throughout an information technology system.

Controls

Security Architecture

Defense in Depth

CIA Triangle

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is a part of the CIA Triangle that ensures that the data is accurate, valid, and protected against unauthorized changes.

Confidentiality

Integrity

Availability

Non-Repudiation

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is part of the CIA Triangle that ensures data is accessible by those who need it when they need it.

Confidentiality

Integrity

Availability

Non-Repudiation

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

There are three basic types of authentications, which of the following is not?

Knowledge-Based Authentication

Property-Based Authentication

Biologically-based Authentication

User-Authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?