Exploring Information Security Pillars

Exploring Information Security Pillars

University

15 Qs

quiz-placeholder

Similar activities

OOP-Q1

OOP-Q1

University

10 Qs

CLC Lesson 4&5 Quiz

CLC Lesson 4&5 Quiz

University

12 Qs

CLC Unit 2 Lesson 5,6 & 7 Quiz

CLC Unit 2 Lesson 5,6 & 7 Quiz

University

12 Qs

DFC20283 CHAPTER 5 (5.1.6-5.1.9)

DFC20283 CHAPTER 5 (5.1.6-5.1.9)

University

10 Qs

Final Literasi Digital

Final Literasi Digital

University

12 Qs

Kuis Arkom 2

Kuis Arkom 2

University

15 Qs

Ulangkaji PB (Ujian 1) Set B

Ulangkaji PB (Ujian 1) Set B

University

10 Qs

Advance Database Concepts (BSIT 3)

Advance Database Concepts (BSIT 3)

University

20 Qs

Exploring Information Security Pillars

Exploring Information Security Pillars

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

Usman Ali

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company stores sensitive customer data. Which pillar ensures that only authorized personnel can access this data?

Network Security

Physical Security

Data Encryption

Identity and Access Management (IAM)

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a data transfer, a file is altered without permission. Which pillar is compromised in this scenario?

Availability

Integrity

Confidentiality

Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user logs into a system using a password and a fingerprint. Which security principle is being applied?

Single sign-on (SSO)

Two-factor authentication (2FA)

Multi-factor encryption

Passwordless authentication

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A server goes down, preventing access to critical applications. Which pillar is affected?

Scalability

Security

Availability

Performance

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee denies sending an email that caused a data breach. Which principle protects against this denial?

Authentication

Confidentiality

Data integrity

Non-repudiation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A bank encrypts its customer transactions. Which pillar does this practice primarily support?

Authentication

Availability

Integrity

Confidentiality

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hacker intercepts a message and changes its content. Which aspect of information security is violated?

Authentication

Integrity

Confidentiality

Availability

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?