QUIZ 1: Fundamental Concepts of IAS 2

QUIZ 1: Fundamental Concepts of IAS 2

University

8 Qs

quiz-placeholder

Similar activities

Risk Assessment: Risk Analysis

Risk Assessment: Risk Analysis

12th Grade - University

7 Qs

Chapter 1 (PG)

Chapter 1 (PG)

University

10 Qs

CyberWarfare and India's take on it

CyberWarfare and India's take on it

University

10 Qs

Cyber Security 101

Cyber Security 101

University

10 Qs

Fundamental Cloud Security (1)

Fundamental Cloud Security (1)

University

7 Qs

ACCT 431 Ch 1 Intro

ACCT 431 Ch 1 Intro

University

8 Qs

KUIS PEMASARAN FARMASI 2 KELAS A, JUMA'AT 23/10/2020

KUIS PEMASARAN FARMASI 2 KELAS A, JUMA'AT 23/10/2020

University

10 Qs

Cyber Security

Cyber Security

University

10 Qs

QUIZ 1: Fundamental Concepts of IAS 2

QUIZ 1: Fundamental Concepts of IAS 2

Assessment

Quiz

Other

University

Easy

Created by

Brian John Q. Rodriguez

Used 24+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is defined as the protection of information and its critical elements such as systems and hardware that use, store, and transmit information.

Information Security

Information Assurance

Information Assurance Process

Information Assurance Pillars

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is defined as the process of protecting information and information systems from unauthorized access, modification, theft or destruction while ensuring their confidentiality, integrity and availability.

Information Security

Information Assurance

Information Assurance Process

Information Assurance Pillars

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Which of the following is not a part of the information Assurance Process?

Enumeration and classification of the information assets to be protected.

Vulnerabilites in the information assets are determined in order to enumerate the threats capable of exploiting the assets.

Considering the probability of a threat exploiting vulnerability in an asset.

Disregarding the impact of a threat exploiting vulnerability in an asset.

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

Information Assurance Model is based on four dimensions namely: information states, security services, security countermeasures, and ______________.

Availability

Integrity

Confidentiality

Time

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is a combination of hardware, software, and telecommunications networks that people build and use to collect, create, and distribute useful data, typically in organizational settings.

Information Security

Information Assurance

Information System

Security Countermeasures

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is a security Countermeasure wherein individuals working in the organization must follow the sets of rules defined in the form of policies to properly handle sensitive information when the information system gets compromised.

Policy and Practice

People

Technology

Non-Repudiation

7.

OPEN ENDED QUESTION

2 mins • 5 pts

Give the 5 Pillars of Information Assurance:

Evaluate responses using AI:

OFF

8.

OPEN ENDED QUESTION

10 mins • 4 pts

Give the 4 dimensions of the Information Assurance Model:

Evaluate responses using AI:

OFF