IS Quiz-Week2 -Security Models

IS Quiz-Week2 -Security Models

University

10 Qs

quiz-placeholder

Similar activities

Protecting Personal Data and Cyber Hygiene Practices

Protecting Personal Data and Cyber Hygiene Practices

University

6 Qs

Basics of Network and Internet Safety

Basics of Network and Internet Safety

10th Grade - University

10 Qs

3RD TERM 2ND C.A.T (I.C.T) YR5

3RD TERM 2ND C.A.T (I.C.T) YR5

5th Grade - University

10 Qs

ICT and Multimedia Quiz

ICT and Multimedia Quiz

12th Grade - University

14 Qs

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

9th Grade - University

15 Qs

How Cyber Safe Are You?

How Cyber Safe Are You?

University

10 Qs

Power of AI Tools

Power of AI Tools

University

10 Qs

IS Quiz-Week2 -Security Models

IS Quiz-Week2 -Security Models

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

ER TN

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for in information security?

Control, Integrity, Access

Confidentiality, Integrity, Availability

Control, Information, Availability

Confidentiality, Information, Assurance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which model is referred to as the DIKW pyramid?

Data, Information, Knowledge, Workflow

Data, Information, Knowledge, Web

Data, Information, Knowledge, Work

Data, Information, Knowledge, Wisdom

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common type of security vulnerability?

Human error

Network speed

Natural disasters

Software updates

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of an information system?

Marketing

Data

Software

Hardware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'social engineering' refer to?

Developing software for social networks

Creating social awareness about security

Engineering social media platforms

Manipulating people to gain confidential information

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a software attack?

Denial-of-service

Natural disaster

Human error

Power failure

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

A network security protocol

A software update process

Malware that demands payment for access

A type of phishing attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?