Information Assurance and Security 2- Prelim

Information Assurance and Security 2- Prelim

University

46 Qs

quiz-placeholder

Similar activities

Cyber threat Intelligence Quiz

Cyber threat Intelligence Quiz

University

44 Qs

ITP 221 - Final Exam

ITP 221 - Final Exam

University

43 Qs

Software engineering MCQ Test 1

Software engineering MCQ Test 1

University

50 Qs

HOOMAN IT ESS

HOOMAN IT ESS

University

48 Qs

IMEI.M5-IUA

IMEI.M5-IUA

University

50 Qs

Pretest CyberOps 3

Pretest CyberOps 3

University

50 Qs

Iceberg_TeamMode_Post

Iceberg_TeamMode_Post

University

47 Qs

T Level - 7.2 Networking

T Level - 7.2 Networking

University

44 Qs

Information Assurance and Security 2- Prelim

Information Assurance and Security 2- Prelim

Assessment

Quiz

Computers

University

Hard

Created by

Regino Vll Guinto

FREE Resource

46 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best represents the three main goals of information security?

Confidentiality, Integrity, Availability

Protection, Encryption, Authentication

Prevention, Detection, Recovery

Hardware, Software, Network

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does “integrity” in the CIA triad primarily ensure?

Data is protected from unauthorized access

Data is accurate and has not been tampered with

Data is available when needed

Data is encrypted during transmission

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of ensuring confidentiality?

Using encryption to protect sensitive files

Backing up critical business data

Implementing redundancy in servers

Monitoring system logs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which threat directly affects availability?

SQL Injection

Denial-of-Service Attack

Phishing Email

Weak Passwords

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Business continuity planning is primarily designed to ensure:

Recovery after a disruption

Prevention of all cyberattacks

Enforcement of confidentiality

Replacement of firewalls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Secure Development Lifecycle (SDLC), which phase involves testing applications for vulnerabilities?

Planning

Design

Implementation

Testing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which OWASP Top 10 vulnerability is exploited when user inputs are not sanitized, allowing attackers to run scripts in a victim’s browser?

Injection

Broken Authentication

Cross-Site Scripting (XSS)

Sensitive Data Exposure

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?