QUIZ 2: Fundamental Concepts of IAS 2

QUIZ 2: Fundamental Concepts of IAS 2

University

15 Qs

quiz-placeholder

Similar activities

[InfoDeck] InfoSession 2.O

[InfoDeck] InfoSession 2.O

University

10 Qs

Certified Ethical Hacker 2

Certified Ethical Hacker 2

University

10 Qs

Introduction to System Administration

Introduction to System Administration

University

15 Qs

Bollard, Barrier and Access Control

Bollard, Barrier and Access Control

University

15 Qs

Crypto-graph not currency

Crypto-graph not currency

University

15 Qs

Cyber

Cyber

University

20 Qs

Cybersecurity Terminology Quiz

Cybersecurity Terminology Quiz

University

20 Qs

 WIRELESS

WIRELESS

University

20 Qs

QUIZ 2: Fundamental Concepts of IAS 2

QUIZ 2: Fundamental Concepts of IAS 2

Assessment

Quiz

Other

University

Easy

Created by

Brian John Q. Rodriguez

Used 22+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is a set of models, methods, and security principles that align with the organizational objectives and keeps the organization safe from cyber threats.

Controls

Security Architecture

Defense in Depth

CIA Triangle

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These are the three layers of information security that are designed and implemented.

Policies, People and Technology (PPT)

CIA Triangle

Security and Operational Controls

Defense in Depth

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These are parameters implemented to protect various forms of data and infrastructure that is important in an organization.

Controls

Security Architecture

Defense in Depth

CIA Triangle

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is the concept used in information security in which multiple layers of security controls are placed throughout an information technology system.

Controls

Security Architecture

Defense in Depth

CIA Triangle

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is a part of the CIA Triangle that ensures that the data is accurate, valid, and protected against unauthorized changes.

Confidentiality

Integrity

Availability

Non-Repudiation

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is part of the CIA Triangle that ensures data is accessible by those who need it when they need it.

Confidentiality

Integrity

Availability

Non-Repudiation

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

There are three basic types of authentications, which of the following is not?

Knowledge-Based Authentication

Property-Based Authentication

Biologically-based Authentication

User-Authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?