Search Header Logo

Module

Authored by Divina 2908

Information Technology (IT)

University

Used 1+ times

Module
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Identify the correct expansion of CNSS.

Committee on National Security Systems

Commission on National Security Solutions

Council for National Systems Security

Committee for National Secure Systems

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

List the three types of controls commonly used to secure databases.


Legal, operational, and financial controls

External, internal, and automated controls

Managerial, technical, and physical controls

Manual, adaptive, and preventive controls

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Explain why physical security alone is no longer sufficient for protecting networked information systems.

Because traditional physical security tools cannot be used in cloud environments

Because most organizations now outsource their IT infrastructure to third parties

Because hardware components are becoming obsolete and need constant upgrades

Because network connectivity introduces new security threats that require digital defenses like firewalls and intrusion detection systems

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Discuss the importance of implementing multi-factor authentication in securing access to sensitive information.

It simplifies the user experience by eliminating the need for passwords

It is a legal requirement for all organizations

It provides an additional layer of security beyond just passwords

It reduces the need for strong passwords

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are the primary differences between symmetric and asymmetric encryption?

Asymmetric encryption is used for data at rest, while symmetric is for data in transit

Symmetric encryption is slower than asymmetric encryption

Symmetric encryption uses a single key, while asymmetric uses a pair of keys

Symmetric encryption is more secure than asymmetric encryption

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What does the acronym DLP stand for in the context of data security?

Data Lifecycle Policy

Data Loss Prevention

Data Leakage Protocol

Digital Loss Protection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the key benefits of using a Virtual Private Network (VPN) for secure internet access?

It improves internet speed by reducing latency

It encrypts internet traffic to protect user privacy

It allows users to bypass geographical restrictions on content

It is a mandatory requirement for all online transactions

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?