Information Security Controls Quiz

Information Security Controls Quiz

Professional Development

22 Qs

quiz-placeholder

Similar activities

Generative AI Worksheet

Generative AI Worksheet

Professional Development

20 Qs

Q1: DATABASE SYSTEM

Q1: DATABASE SYSTEM

Professional Development

18 Qs

Excel Kontingenční Kung-fu a dynamická magie

Excel Kontingenční Kung-fu a dynamická magie

Professional Development

20 Qs

Data Science Quiz 1

Data Science Quiz 1

Professional Development

17 Qs

Cyber Security livello 2

Cyber Security livello 2

Professional Development

20 Qs

EXCEL II - EXÁMEN FINAL

EXCEL II - EXÁMEN FINAL

Professional Development

20 Qs

Frontend - CTO Cup

Frontend - CTO Cup

Professional Development

20 Qs

Information Security Controls Quiz

Information Security Controls Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Adrian Henderson

Used 1+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a technical control in information security?

Security policy enforcement

Intrusion Detection System (IDS)

User training program

Security camera installation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization installs a badge reader and surveillance cameras at all facility entrances. What type of control is this?

Operational

Managerial

Technical

Physical

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security control type includes activities such as incident response planning and access reviews?

Physical

Operational

Managerial

Preventive

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following controls is designed to alert administrators to a security incident?

Preventive

Corrective

Detective

Compensating

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a compensating control?

To prevent unauthorized access

To detect unusual activity

To serve as an alternative when primary controls fail

To guide user behavior through policies

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of the Zero Trust model evaluates access policies before granting access?

Policy Enforcement Point

Policy Administrator

Policy Engine

Security Token Service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What role does non-repudiation play in cybersecurity?

Prevents data interception

Ensures system redundancy

Proves an action or communication occurred

Encrypts user credentials

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?