
Information Systems Security Quiz

Quiz
•
Other
•
University
•
Hard

Sarah Haruna Moda
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Michael is a system administrator for a large company. Despite implementing strong passwords and regular updates, he discovers that the company's systems are still vulnerable. What is one reason systems are vulnerable?
Strong passwords
Data encryption
Unauthorized access
Regular updates
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a company, Abigail is responsible for ensuring that sensitive customer data is protected. She often discusses the importance of the CIA triad in information security with her team. What does the CIA triad stand for?
Confidentiality, Integrity, Availability
Control, Information, Availability
Control, Integrity, Access
Confidentiality, Information, Access
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a cybersecurity training session, Zoe learned about different types of software that can affect computer systems. The instructor asked the class, "Which of the following is a type of malware?"
Backup
VPN
Trojan horse
Firewall
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a busy office, the IT department has implemented a firewall to protect the company's network. What is the purpose of this firewall?
To prevent unauthorized access
To store data
To encrypt data
To monitor network traffic
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a company meeting, an employee named Grace receives a phone call from someone claiming to be from the IT department. The caller asks Grace to confirm her login credentials to resolve a supposed issue with her account. What does this situation exemplify in the context of security?
Creating strong passwords
Using software to protect data
Tricking individuals into revealing confidential information
Physical security measures
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a corporate office, employees need to access sensitive information stored on the company server. Which of the following is a method of access control to ensure that only authorized personnel can access this information?
Network monitoring
User ID and password
Data encryption
Malware detection
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Ava, a software developer, discovers a flaw in her company's application that has not yet been patched. This flaw could potentially be exploited by hackers. What is this type of vulnerability called?
A flaw in software that is publicly known
A flaw in software that is not yet patched
A security policy
A type of malware
Create a free account and access millions of resources
Similar Resources on Wayground
16 questions
Module 2- Cyber Forensics

Quiz
•
12th Grade - University
17 questions
Unit VI Business Intelligence

Quiz
•
University
15 questions
QUIZ 2: Fundamental Concepts of IAS 2

Quiz
•
University
15 questions
Tutorial 1 Electronic Records

Quiz
•
University
15 questions
PHYSICAL SECURITY MANAGEMENT

Quiz
•
University
20 questions
LU 6 Auditing General & application controls quiz

Quiz
•
University
20 questions
Cyber Security Quiz

Quiz
•
University
21 questions
PIT B Edmentum Post Test 8

Quiz
•
9th Grade - University
Popular Resources on Wayground
55 questions
CHS Student Handbook 25-26

Quiz
•
9th Grade
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
10 questions
Chaffey

Quiz
•
9th - 12th Grade
15 questions
PRIDE

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
22 questions
6-8 Digital Citizenship Review

Quiz
•
6th - 8th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade