It is defined as the protection of information and its critical elements such as systems and hardware that use, store, and transmit information.
QUIZ 1: Fundamental Concepts of IAS 2

Quiz
•
Other
•
University
•
Easy
Brian John Q. Rodriguez
Used 24+ times
FREE Resource
8 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Information Security
Information Assurance
Information Assurance Process
Information Assurance Pillars
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
It is defined as the process of protecting information and information systems from unauthorized access, modification, theft or destruction while ensuring their confidentiality, integrity and availability.
Information Security
Information Assurance
Information Assurance Process
Information Assurance Pillars
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Which of the following is not a part of the information Assurance Process?
Enumeration and classification of the information assets to be protected.
Vulnerabilites in the information assets are determined in order to enumerate the threats capable of exploiting the assets.
Considering the probability of a threat exploiting vulnerability in an asset.
Disregarding the impact of a threat exploiting vulnerability in an asset.
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Information Assurance Model is based on four dimensions namely: information states, security services, security countermeasures, and ______________.
Availability
Integrity
Confidentiality
Time
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
It is a combination of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings.
Information Security
Information Assurance
Information System
Security Countermeasures
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
It is a security Countermeasure wherein individuals working in the organization must follow the sets of rules defined in the form of policies to properly handle sensitive information when the information system gets compromised.
Policy and Practice
People
Technology
Non-Repudiation
7.
OPEN ENDED QUESTION
2 mins • 5 pts
Give the 5 Pillars of Information Assurance:
Evaluate responses using AI:
OFF
8.
OPEN ENDED QUESTION
10 mins • 4 pts
Give the 4 dimensions of the Information Assurance Model:
Evaluate responses using AI:
OFF
Similar Resources on Quizizz
10 questions
Industrial Security

Quiz
•
University
10 questions
Cyber Security

Quiz
•
University
10 questions
Privacy Issues Quiz

Quiz
•
University
10 questions
Cybercrime

Quiz
•
University
10 questions
Quiz on ISO 9001

Quiz
•
University
10 questions
CIS314M_GroupB

Quiz
•
University
10 questions
ITELECT4 - Integrated Programming Technologies II

Quiz
•
University
10 questions
CyberWarfare and India's take on it

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade