Exploring Information Security Pillars

Exploring Information Security Pillars

University

15 Qs

quiz-placeholder

Similar activities

MGT334_OS Basics Questions

MGT334_OS Basics Questions

University

20 Qs

OSS (QUIZ 7) Input/Output Systems

OSS (QUIZ 7) Input/Output Systems

University

20 Qs

Ulangkaji PB Teori (Ujian 2) Set B

Ulangkaji PB Teori (Ujian 2) Set B

University

10 Qs

SOFTWARE ENGINEERING

SOFTWARE ENGINEERING

University

20 Qs

QUIZ PENGEMBANGAN PERANGKAT LUNAK DAN GIM

QUIZ PENGEMBANGAN PERANGKAT LUNAK DAN GIM

10th Grade - University

15 Qs

3.1(a)(b) - Lecture

3.1(a)(b) - Lecture

University

15 Qs

Q6. Cybersecurity Best Practices

Q6. Cybersecurity Best Practices

University

15 Qs

Entity Relationship Modeling Quiz

Entity Relationship Modeling Quiz

University

20 Qs

Exploring Information Security Pillars

Exploring Information Security Pillars

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

Usman Ali

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A company stores sensitive customer data. Which pillar ensures that only authorized personnel can access this data?

Network Security

Physical Security

Data Encryption

Identity and Access Management (IAM)

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During a data transfer, a file is altered without permission. Which pillar is compromised in this scenario?

Availability

Integrity

Confidentiality

Authentication

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A user logs into a system using a password and a fingerprint. Which security principle is being applied?

Single sign-on (SSO)

Two-factor authentication (2FA)

Multi-factor encryption

Passwordless authentication

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A server goes down, preventing access to critical applications. Which pillar is affected?

Scalability

Security

Availability

Performance

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee denies sending an email that caused a data breach. Which principle protects against this denial?

Authentication

Confidentiality

Data integrity

Non-repudiation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A bank encrypts its customer transactions. Which pillar does this practice primarily support?

Authentication

Availability

Integrity

Confidentiality

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A hacker intercepts a message and changes its content. Which aspect of information security is violated?

Authentication

Integrity

Confidentiality

Availability

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?