Quiz 1 - PROFE5 313 - BSIS 3A

Quiz 1 - PROFE5 313 - BSIS 3A

Professional Development

25 Qs

quiz-placeholder

Similar activities

IT Fundamentals+ Network, Security Concepts & Databases

IT Fundamentals+ Network, Security Concepts & Databases

Professional Development

21 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

AWS Chapter 5  IAM

AWS Chapter 5 IAM

Professional Development

20 Qs

Secure Use of IT

Secure Use of IT

Professional Development

26 Qs

2019 AISD New Staff

2019 AISD New Staff

Professional Development

20 Qs

AWS Databases

AWS Databases

Professional Development

20 Qs

Cyber 2 Module 9

Cyber 2 Module 9

9th Grade - Professional Development

21 Qs

DOCUMENT-INFORMATION SECURITY

DOCUMENT-INFORMATION SECURITY

Professional Development

20 Qs

Quiz 1 - PROFE5 313 - BSIS 3A

Quiz 1 - PROFE5 313 - BSIS 3A

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Ryan Gente

Used 15+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the main goal of information security?
To make information public
To keep important information safe from unauthorized access
To store as much information as possible
To allow anyone to edit documents

Answer explanation

Information security ensures that only authorized people can access important data.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of confidentiality?
Leaving your phone unlocked
Keeping your email password private
Allowing everyone to access your school records
Using “password” as your login

Answer explanation

Confidentiality ensures that sensitive data is only accessed by the right people.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is integrity in information security?
Keeping information private
Ensuring information is correct and unchanged by unauthorized people
Making sure information is always accessible
Encrypting all files

Answer explanation

Integrity ensures that data remains accurate and trustworthy.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of these is an example of availability?
Blocking everyone from accessing information
Ensuring authorized users can access data when needed
Deleting old files regularly
Sharing private information with everyone

Answer explanation

Availability ensures that data is accessible when required.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of these is a good information security habit?
Writing down your password on a sticky note
Using strong passwords
Clicking on unknown links
Using “12345” as your password

Answer explanation

Strong passwords help protect your accounts from being hacked.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the purpose of information security management?
To make security rules and protect important information
To allow hackers to access data
To remove security measures for easy access
To share personal data with everyone

Answer explanation

Information security management sets policies to protect data.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is an example of a phishing attack?
Sending a friend a text message
Receiving an email that looks official but asks for your password
Downloading a school assignment
Updating your computer software

Answer explanation

Phishing emails trick people into revealing personal information.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?