Information Security Controls Quiz

Information Security Controls Quiz

Professional Development

22 Qs

quiz-placeholder

Similar activities

WAPT 1 - OWASP TOP 10

WAPT 1 - OWASP TOP 10

Professional Development

20 Qs

svsvs

svsvs

Professional Development

20 Qs

Chapter 10: Incident Detection and Analysis

Chapter 10: Incident Detection and Analysis

Professional Development

20 Qs

Cybersecurity and IT Infrastructure Quiz

Cybersecurity and IT Infrastructure Quiz

Professional Development

20 Qs

CB-Quiz On AWS_IAM USER

CB-Quiz On AWS_IAM USER

Professional Development

20 Qs

Women-in-Tek 2025 Assessment

Women-in-Tek 2025 Assessment

Professional Development

20 Qs

Chapter 3: Malicious Activity

Chapter 3: Malicious Activity

Professional Development

20 Qs

Information Security Controls Quiz

Information Security Controls Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Adrian Henderson

Used 1+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a technical control in information security?

Security policy enforcement

Intrusion Detection System (IDS)

User training program

Security camera installation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization installs a badge reader and surveillance cameras at all facility entrances. What type of control is this?

Operational

Managerial

Technical

Physical

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security control type includes activities such as incident response planning and access reviews?

Physical

Operational

Managerial

Preventive

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following controls is designed to alert administrators to a security incident?

Preventive

Corrective

Detective

Compensating

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of a compensating control?

To prevent unauthorized access

To detect unusual activity

To serve as an alternative when primary controls fail

To guide user behavior through policies

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which component of the Zero Trust model evaluates access policies before granting access?

Policy Enforcement Point

Policy Administrator

Policy Engine

Security Token Service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What role does non-repudiation play in cybersecurity?

Prevents data interception

Ensures system redundancy

Proves an action or communication occurred

Encrypts user credentials

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?