Exploring Information Security Pillars

Exploring Information Security Pillars

University

15 Qs

quiz-placeholder

Similar activities

Windows Server Installation with DHCP, DNS, and AD

Windows Server Installation with DHCP, DNS, and AD

University

18 Qs

Data Management and Storage

Data Management and Storage

University

10 Qs

Week 1 - Topic 1 SECP3623-02

Week 1 - Topic 1 SECP3623-02

University

20 Qs

Biomimicry

Biomimicry

University

12 Qs

Q5. Normalization of Database Table

Q5. Normalization of Database Table

University

17 Qs

BASIC PC COMPONENTS AND TROUBLESHOOTING  - BATCH 1

BASIC PC COMPONENTS AND TROUBLESHOOTING - BATCH 1

University

15 Qs

Fundamentals

Fundamentals

7th Grade - University

12 Qs

Exploring Information Security Pillars

Exploring Information Security Pillars

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

Usman Ali

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company stores sensitive customer data. Which pillar ensures that only authorized personnel can access this data?

Network Security

Physical Security

Data Encryption

Identity and Access Management (IAM)

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a data transfer, a file is altered without permission. Which pillar is compromised in this scenario?

Availability

Integrity

Confidentiality

Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user logs into a system using a password and a fingerprint. Which security principle is being applied?

Single sign-on (SSO)

Two-factor authentication (2FA)

Multi-factor encryption

Passwordless authentication

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A server goes down, preventing access to critical applications. Which pillar is affected?

Scalability

Security

Availability

Performance

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee denies sending an email that caused a data breach. Which principle protects against this denial?

Authentication

Confidentiality

Data integrity

Non-repudiation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A bank encrypts its customer transactions. Which pillar does this practice primarily support?

Authentication

Availability

Integrity

Confidentiality

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hacker intercepts a message and changes its content. Which aspect of information security is violated?

Authentication

Integrity

Confidentiality

Availability

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?