QUIZ 2: Fundamental Concepts of IAS 2

QUIZ 2: Fundamental Concepts of IAS 2

University

15 Qs

quiz-placeholder

Similar activities

Parenting PJJ SDIT Buahati 2. Sabtu, 18 Juli 2020

Parenting PJJ SDIT Buahati 2. Sabtu, 18 Juli 2020

1st Grade - Professional Development

10 Qs

CAT 2 (ONLINE)

CAT 2 (ONLINE)

University

15 Qs

Quiz Beauty of Ramadhan Session 2

Quiz Beauty of Ramadhan Session 2

University

10 Qs

UH Teknologi Layanan jaringan Kelas 12 smt 2

UH Teknologi Layanan jaringan Kelas 12 smt 2

1st Grade - University

20 Qs

QUIZ 2 - FINALS

QUIZ 2 - FINALS

University

15 Qs

Module 2- Cyber Forensics

Module 2- Cyber Forensics

12th Grade - University

16 Qs

College & Careers CH 2 Reading Cloze

College & Careers CH 2 Reading Cloze

11th Grade - University

17 Qs

Database System 1930 - Quiz 2

Database System 1930 - Quiz 2

University

15 Qs

QUIZ 2: Fundamental Concepts of IAS 2

QUIZ 2: Fundamental Concepts of IAS 2

Assessment

Quiz

Other

University

Easy

Created by

Brian John Q. Rodriguez

Used 22+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is a set of models, methods, and security principles that align with the organizational objectives and keeps the organization safe from cyber threats.

Controls

Security Architecture

Defense in Depth

CIA Triangle

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These are the three layers of information security that are designed and implemented.

Policies, People and Technology (PPT)

CIA Triangle

Security and Operational Controls

Defense in Depth

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These are parameters implemented to protect various forms of data and infrastructure that is important in an organization.

Controls

Security Architecture

Defense in Depth

CIA Triangle

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is the concept used in information security in which multiple layers of security controls are placed throughout an information technology system.

Controls

Security Architecture

Defense in Depth

CIA Triangle

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is a part of the CIA Triangle that ensures that the data is accurate, valid, and protected against unauthorized changes.

Confidentiality

Integrity

Availability

Non-Repudiation

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is part of the CIA Triangle that ensures data is accessible by those who need it when they need it.

Confidentiality

Integrity

Availability

Non-Repudiation

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

There are three basic types of authentications, which of the following is not?

Knowledge-Based Authentication

Property-Based Authentication

Biologically-based Authentication

User-Authentication

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?