IS Quiz-Week2 -Security Models

IS Quiz-Week2 -Security Models

University

10 Qs

quiz-placeholder

Similar activities

InfoSec Quiz 1

InfoSec Quiz 1

University

15 Qs

QUIZ 3: SECURITY TOOLS and  VULNERABILITY ANALYSIS

QUIZ 3: SECURITY TOOLS and VULNERABILITY ANALYSIS

University

11 Qs

Understanding Database Management Systems

Understanding Database Management Systems

12th Grade - University

10 Qs

Quiz Profesi dan Ketrampilan Bidang TKJ

Quiz Profesi dan Ketrampilan Bidang TKJ

10th Grade - University

10 Qs

Recap W02 - W04 Information and Communication Technology

Recap W02 - W04 Information and Communication Technology

University

12 Qs

IT for Managers - M2

IT for Managers - M2

University

11 Qs

Coding and AI Knowledge Check

Coding and AI Knowledge Check

10th Grade - University

10 Qs

IS Quiz

IS Quiz

University

10 Qs

IS Quiz-Week2 -Security Models

IS Quiz-Week2 -Security Models

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

ER TN

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for in information security?

Control, Integrity, Access

Confidentiality, Integrity, Availability

Control, Information, Availability

Confidentiality, Information, Assurance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which model is referred to as the DIKW pyramid?

Data, Information, Knowledge, Workflow

Data, Information, Knowledge, Web

Data, Information, Knowledge, Work

Data, Information, Knowledge, Wisdom

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common type of security vulnerability?

Human error

Network speed

Natural disasters

Software updates

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of an information system?

Marketing

Data

Software

Hardware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'social engineering' refer to?

Developing software for social networks

Creating social awareness about security

Engineering social media platforms

Manipulating people to gain confidential information

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a software attack?

Denial-of-service

Natural disaster

Human error

Power failure

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

A network security protocol

A software update process

Malware that demands payment for access

A type of phishing attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)