
Week 1 IS-IA Quiz 1
Authored by Nasser Hilla
Information Technology (IT)
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for the principle that ensures authorized users can access and use information and systems when needed?
Confidentiality
Integrity
Availability
Non-repudiation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes the "Security Mindset"?
Reacting to security threats after they occur.
A proactive and critical way of thinking in cybersecurity.
Focusing solely on physical security measures.
Minimizing risk assessment in security planning.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Information Security (IS) is defined as the protection of information from unauthorized access or alterations. Which of the following is it a subset of IS?
Cybersecurity
Information Assurance (IA)
Physical Security
Data Privacy
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a proactive security model differ from a reactive security model?
Reactive models focus on prevention, while proactive models focus on response.
Proactive models take preventative measures, while reactive models respond after detection.
Reactive models are more common in the digital era, while proactive models are traditional.
Proactive models only consider physical threats, reactive models only digital.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company implements strong encryption for all its sensitive customer data. Which principle of Information Assurance is primarily being addressed by this measure?
Availability
Integrity
Authentication
Confidentiality
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A university's student grading system is designed to prevent any unauthorized changes to grades once they are officially submitted. This aligns with which core principle of Information Assurance?
Availability
Confidentiality
Integrity
Authentication
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
During a security audit, an IT professional critically examines a new system's architecture, looking for potential weaknesses that even advanced attackers might exploit, rather than just known vulnerabilities. This approach best exemplifies which concept?
Reactive Security
Reasoned Paranoia
Risk Overreaction
Compliance Auditing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?