
IIS Trial Test
Authored by Hiền Đào
Science
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Risk analysis is MOST useful when applied during which phase of the system development process?
Requirements definition
Implementation planning
Project identification
System construction
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which must bear the primary responsibility for determining the level of protection needed for information systems resources?
Senior Management
Seniors security analysts
System auditors
IS security specialists
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following describes a covert timing channel?
Provides the timing trigger to activate a malicious program disguised as a legitimate function.
Used by a supervisor to monitor the productivity of a user without their knowledge.
Allows one process to signal information to another by modulating its own use of system resources.
Modulated to carry an unintended information signal that can only be detected by special, sensitive receivers.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is being considered as the most reliable kind of personal identification?
Finger print
Ticket Granting
Password
Token
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main responsibility of the information owner?
making the determination to decide what level of classification the information requires
periodically checking the validity and accuracy for all data in the information system
running regular backups
audit the users when they require access to the information
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is called the access protection system that limits connections by calling back the number of a previously authorized location?
Sendback forward systems
Callback forward systems
Sendback system
Callback systems
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is called a type of access control where a central authority determines what subjects can have access to certain objects, based on the organizational security policy?
Rule-based access control
Non-discretionary Access Control
Mandatory Access Control
Discretionary Access Control
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
60 questions
Anatomy & Physiology Midterm Review
Quiz
•
University
60 questions
Unit 3 Study Guide
Quiz
•
6th Grade - University
57 questions
DatuBāzesTests
Quiz
•
University
61 questions
7th Grade Semester 2 Final Review
Quiz
•
7th Grade - University
60 questions
F2 SAINS BOOSTER UASA 2025 #CGZANNA
Quiz
•
7th Grade - University
59 questions
Wave Quizzizz
Quiz
•
10th Grade - University
58 questions
SOL Energy Test Review Part 2
Quiz
•
5th Grade - University
65 questions
Modern technologies
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade