
Information Security Quiz
Authored by Mohd Norfahmi Jaafar
Information Technology (IT)
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT part of the CIA triad in information security?
Confidentiality
Integrity
Availability
Authentication
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term refers to ensuring that information is not altered or tampered with?
Integrity
Confidentiality
Availability
Non-repudiation
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which phase of hacking involves gathering information about a target?
Scanning
Reconnaissance
Gaining Access
Clearing Tracks
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the Cyber Kill Chain, which company developed the model?
Microsoft
Lockheed Martin
IBM
Cisco
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of non-repudiation?
Digital signatures
Encryption
Firewall
Antivirus
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first phase in the hacking process?
Reconnaissance
Scanning
Maintaining Access
Gaining Access
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security principle ensures that only authorized users can access resources?
Confidentiality
Availability
Authentication
Integrity
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?