Information Security Quiz

Information Security Quiz

University

20 Qs

quiz-placeholder

Similar activities

ISC Week 11

ISC Week 11

12th Grade - University

20 Qs

Python Loop

Python Loop

University

15 Qs

IntroductionDatabases

IntroductionDatabases

University

20 Qs

UTS Digimin FEB

UTS Digimin FEB

University

20 Qs

The Linux Vault

The Linux Vault

University

15 Qs

ITEC 70 - Quiz # 2

ITEC 70 - Quiz # 2

University

15 Qs

Uji Pemahaman Microsoft Word Kelas 8

Uji Pemahaman Microsoft Word Kelas 8

8th Grade - University

20 Qs

Test Kemanan Komputer Pertemuan 01

Test Kemanan Komputer Pertemuan 01

University

16 Qs

Information Security Quiz

Information Security Quiz

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Mohd Norfahmi Jaafar

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT part of the CIA triad in information security?

Confidentiality

Integrity

Availability

Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to ensuring that information is not altered or tampered with?

Integrity

Confidentiality

Availability

Non-repudiation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which phase of hacking involves gathering information about a target?

Scanning

Reconnaissance

Gaining Access

Clearing Tracks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Cyber Kill Chain, which company developed the model?

Microsoft

Lockheed Martin

IBM

Cisco

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of non-repudiation?

Digital signatures

Encryption

Firewall

Antivirus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first phase in the hacking process?

Reconnaissance

Scanning

Maintaining Access

Gaining Access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principle ensures that only authorized users can access resources?

Confidentiality

Availability

Authentication

Integrity

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?