Information Security Quiz

Information Security Quiz

Professional Development

53 Qs

quiz-placeholder

Similar activities

(Part 2) Cloud Essentials Study Guide

(Part 2) Cloud Essentials Study Guide

Professional Development

48 Qs

CC-IAT2 QUIZ

CC-IAT2 QUIZ

Professional Development

50 Qs

Health and safety

Health and safety

Professional Development

50 Qs

Power up P3

Power up P3

Professional Development

50 Qs

SC-900 Day 3

SC-900 Day 3

Professional Development

50 Qs

Practice Exam 1

Practice Exam 1

Professional Development

50 Qs

Database management systems

Database management systems

Professional Development

58 Qs

AZ-900 Practice Test 6

AZ-900 Practice Test 6

Professional Development

51 Qs

Information Security Quiz

Information Security Quiz

Assessment

Quiz

Computers

Professional Development

Easy

Created by

Yumeth Bandara

Used 1+ times

FREE Resource

53 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

What are the three core principles of information security?

Authentication, Encryption, Firewall

Confidentiality, Integrity, Availability

Passwords, Firewalls, Antivirus

Data, Software, Hardware

2.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

Which of the following is NOT a best practice for securing an operating system?

Keeping the OS updated

Using weak passwords

Enabling firewalls

Disabling unused services

3.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

What is the primary purpose of a firewall?

To increase internet speed

To block unauthorized access

To store backup data

To encrypt files

4.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

What type of attack aims to trick a user into revealing sensitive information?

Phishing

DDoS

Malware injection

SQL Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

What security measure is used to protect data from unauthorized access while stored or transmitted?

Firewall

Encryption

Antivirus

Backup

6.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

What is the most secure method for authentication?

Single password authentication

Multi-factor authentication (MFA)

Username-based access

No authentication needed

7.

MULTIPLE CHOICE QUESTION

30 sec • 20 pts

Which of the following operating systems is considered more vulnerable to attacks?

Linux

macOS

Windows

Unix

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?