Information Security Quiz

Information Security Quiz

University

20 Qs

quiz-placeholder

Similar activities

SOFAPP MIDTERM RECITATION

SOFAPP MIDTERM RECITATION

University

15 Qs

LibreOffice Writer Styles Quiz

LibreOffice Writer Styles Quiz

10th Grade - University

15 Qs

LogoNOVA (FYIT Logo Quiz)

LogoNOVA (FYIT Logo Quiz)

University

20 Qs

IAS 1 - QUIZ No. 1

IAS 1 - QUIZ No. 1

University

20 Qs

Quiz You Are Smarter Than Scammer

Quiz You Are Smarter Than Scammer

University

15 Qs

Qual a sua próxima certificação?

Qual a sua próxima certificação?

University

15 Qs

PPL (QUIZ 6) Memory Management Quiz

PPL (QUIZ 6) Memory Management Quiz

University

20 Qs

GEE-109 LIVING IN AN IT ERA

GEE-109 LIVING IN AN IT ERA

University

20 Qs

Information Security Quiz

Information Security Quiz

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Mohd Norfahmi Jaafar

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT part of the CIA triad in information security?

Confidentiality

Integrity

Availability

Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to ensuring that information is not altered or tampered with?

Integrity

Confidentiality

Availability

Non-repudiation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which phase of hacking involves gathering information about a target?

Scanning

Reconnaissance

Gaining Access

Clearing Tracks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Cyber Kill Chain, which company developed the model?

Microsoft

Lockheed Martin

IBM

Cisco

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of non-repudiation?

Digital signatures

Encryption

Firewall

Antivirus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first phase in the hacking process?

Reconnaissance

Scanning

Maintaining Access

Gaining Access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principle ensures that only authorized users can access resources?

Confidentiality

Availability

Authentication

Integrity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?