Information Assurance in a Government DoD (GROUP 7)

Information Assurance in a Government DoD (GROUP 7)

University

20 Qs

quiz-placeholder

Similar activities

Lesson 02: Understanding Cyber Security Threats

Lesson 02: Understanding Cyber Security Threats

University

25 Qs

Matplotlib Quiz Class 12th

Matplotlib Quiz Class 12th

12th Grade - University

20 Qs

Seguridad RLS en Postgrest

Seguridad RLS en Postgrest

University

15 Qs

Employee Self-Service Portals Quiz

Employee Self-Service Portals Quiz

University

15 Qs

Information Security Quiz

Information Security Quiz

University

20 Qs

Data Security

Data Security

12th Grade - University

17 Qs

Huawei Security

Huawei Security

University

15 Qs

Danger online

Danger online

7th Grade - University

25 Qs

Information Assurance in a Government DoD (GROUP 7)

Information Assurance in a Government DoD (GROUP 7)

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Mark Feguro

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is the primary reason Information Assurance (IA) is crucial for the Department of Defense (DoD)?

Enhancing office productivity and efficiency.

Complying with international privacy laws.

Ensuring the protection of national security

To increase the budget for the technology department.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following frameworks is mentioned as a guide for the DoD's IA strategy?

Six Sigma

COBIT (Control Objectives for Information and Related Technologies)

The Risk Management Framework (RMF)

ITIL (Information Technology Infrastructure Library)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A breach in DoD systems could cause 'real-world damage' because these systems are:

Easily replaceable with commercial alternatives.

High-stakes, controlling weapons and logistics.

only relevant to software developmentPrimarily used for public relations.

Monitored by international watchdogs.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an 'Advanced Persistent Threat' (APT) as mentioned in the context of cyberwarfare?

A type of hardware malfunction in defense systems.

A common computer virus that is easily detected.

A physical security breach at a military facility.

A sophisticated, long-term cyberattack, often by a nation-state.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the core principle of the DoD's Information Assurance strategy?

A risk-based approach applied throughout a system's life cycle.

A compliance-based approach focused only on federal laws.

An outsourced approach relying on third-party security firms.

A reactive approach that responds to breaches after they occur.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A 'zero-day exploit' is a vulnerability that:

Is exploited before the developers are aware of it.

Can be blocked by any standard antivirus software.

Is known to developers but has not been patched yet.

Only affects systems that have not been updated in a year.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT listed as an area where Information Assurance is implemented?

Surveillance drones

Satellite communications

Battlefield networks

Civilian social media platforms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?