GROUP 7 BLOCK A

GROUP 7 BLOCK A

University

34 Qs

quiz-placeholder

Similar activities

ITSY201-Fundamentals of computer security-Practice Chapter 1 2 3

ITSY201-Fundamentals of computer security-Practice Chapter 1 2 3

University

30 Qs

IAS CH1 QUIZ

IAS CH1 QUIZ

University

35 Qs

033_Hardware Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

033_Hardware Vulnerabilities – CompTIA Security+ SY0-701 – 2.3

9th Grade - University

31 Qs

CompTIA Security+ Practice Exam 2

CompTIA Security+ Practice Exam 2

University

37 Qs

Cybersecurity attack types

Cybersecurity attack types

9th Grade - University

30 Qs

emerging technology (ai-iot-blockchain)

emerging technology (ai-iot-blockchain)

University

30 Qs

STC - Cyber Security and Forensics

STC - Cyber Security and Forensics

University

30 Qs

Chapter10-Routing

Chapter10-Routing

University

38 Qs

GROUP 7 BLOCK A

GROUP 7 BLOCK A

Assessment

Quiz

Computers

University

Medium

Created by

Christopher Mamac

Used 34+ times

FREE Resource

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

These focus on controls needed to review, analyze, and appropriately prioritize the organization’s activities against ongoing security risks

Control frameworks

Program framework

Risk frameworks

Security Frameworks

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

is to present a higher-level view of the organization’s security efforts.

Control frameworks

Program framework

Risk frameworks

Security Frameworks

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The foundation of all security programs – the specific controls and processes that help protect against threats.

Control frameworks

Program framework

Risk frameworks

Security Frameworks

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Is a set of policies, guidelines, and best practices designed to manage an organization’s information security risks

Control frameworks

Program framework

Risk frameworks

Security Frameworks

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Verifying the identity of users, devices, or applications trying to access resources.

Confidentiality

Integrity

Availability

Authentication

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Determining what authenticated users are allowed to do and access.

Confidentiality

Authorization

Availability

Authentication

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Ensuring that systems and data are accessible to authorized users when needed.

Confidentiality

Authorization

Availability

Authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?