Exploring Information Security Pillars

Exploring Information Security Pillars

University

15 Qs

quiz-placeholder

Similar activities

S2 Microsoft Access Database Quiz

S2 Microsoft Access Database Quiz

10th Grade - University

15 Qs

cybersecurity-common security infrastructure security

cybersecurity-common security infrastructure security

University

15 Qs

PTS Genap Informatika Kelas XII

PTS Genap Informatika Kelas XII

12th Grade - University

20 Qs

CS10337 - Lectrure #1

CS10337 - Lectrure #1

University

10 Qs

Network secutiry

Network secutiry

9th Grade - University

10 Qs

Business Security Assessment for 9th Grade

Business Security Assessment for 9th Grade

8th Grade - University

20 Qs

Introduction to Information Security

Introduction to Information Security

University

20 Qs

Identity and Access Management Quiz

Identity and Access Management Quiz

University

18 Qs

Exploring Information Security Pillars

Exploring Information Security Pillars

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Usman Ali

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company stores sensitive customer data. Which pillar ensures that only authorized personnel can access this data?

Network Security

Physical Security

Data Encryption

Identity and Access Management (IAM)

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a data transfer, a file is altered without permission. Which pillar is compromised in this scenario?

Availability

Integrity

Confidentiality

Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user logs into a system using a password and a fingerprint. Which security principle is being applied?

Single sign-on (SSO)

Two-factor authentication (2FA)

Multi-factor encryption

Passwordless authentication

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A server goes down, preventing access to critical applications. Which pillar is affected?

Scalability

Security

Availability

Performance

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee denies sending an email that caused a data breach. Which principle protects against this denial?

Authentication

Confidentiality

Data integrity

Non-repudiation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A bank encrypts its customer transactions. Which pillar does this practice primarily support?

Authentication

Availability

Integrity

Confidentiality

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hacker intercepts a message and changes its content. Which aspect of information security is violated?

Authentication

Integrity

Confidentiality

Availability

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?