Exploring Information Security Pillars

Exploring Information Security Pillars

University

15 Qs

quiz-placeholder

Similar activities

Module 8 - Computer and Network Security

Module 8 - Computer and Network Security

University

20 Qs

IAS 1 - QUIZ No. 1

IAS 1 - QUIZ No. 1

University

20 Qs

LINKS Cyber Youth Challenge - Round 1

LINKS Cyber Youth Challenge - Round 1

University

10 Qs

ICYS5112 LU1 Quiz

ICYS5112 LU1 Quiz

University

15 Qs

Access Control (Authorise vs Authenticate)

Access Control (Authorise vs Authenticate)

University

10 Qs

Cyber Offences Quiz

Cyber Offences Quiz

University

20 Qs

Understanding Security Imperatives

Understanding Security Imperatives

University

20 Qs

Exploring Information Security Pillars

Exploring Information Security Pillars

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Usman Ali

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company stores sensitive customer data. Which pillar ensures that only authorized personnel can access this data?

Network Security

Physical Security

Data Encryption

Identity and Access Management (IAM)

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a data transfer, a file is altered without permission. Which pillar is compromised in this scenario?

Availability

Integrity

Confidentiality

Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user logs into a system using a password and a fingerprint. Which security principle is being applied?

Single sign-on (SSO)

Two-factor authentication (2FA)

Multi-factor encryption

Passwordless authentication

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A server goes down, preventing access to critical applications. Which pillar is affected?

Scalability

Security

Availability

Performance

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee denies sending an email that caused a data breach. Which principle protects against this denial?

Authentication

Confidentiality

Data integrity

Non-repudiation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A bank encrypts its customer transactions. Which pillar does this practice primarily support?

Authentication

Availability

Integrity

Confidentiality

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hacker intercepts a message and changes its content. Which aspect of information security is violated?

Authentication

Integrity

Confidentiality

Availability

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)