IT3101-IAS-PLE

IT3101-IAS-PLE

Professional Development

50 Qs

quiz-placeholder

Similar activities

Referensi SOAL PAS Hlookup Vlookup Match Index Choose

Referensi SOAL PAS Hlookup Vlookup Match Index Choose

Professional Development

50 Qs

Kuis Media Sosial

Kuis Media Sosial

Professional Development

50 Qs

mod 8

mod 8

Professional Development

53 Qs

A+ review 2

A+ review 2

Professional Development

50 Qs

Python_Mock

Python_Mock

Professional Development

50 Qs

AT7 - la collaborazione con gli insegnanti e DS innovazione

AT7 - la collaborazione con gli insegnanti e DS innovazione

Professional Development

45 Qs

Quiz o programowaniu

Quiz o programowaniu

Professional Development

45 Qs

Power BI Review

Power BI Review

Professional Development

50 Qs

IT3101-IAS-PLE

IT3101-IAS-PLE

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Ardi Moran

Used 9+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker modifies financial records to insert fraudulent transactions. Which triad(s) were directly violated?

CIA – Availability only

CIA – Confidentiality and Integrity

CIA – Integrity only

DAD – Denial and Disclosure

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a flood destroyed its primary data center, a company relied on its secondary backup facility to restore operations. Which CIA principle was preserved by this action?

Confidentiality

Integrity

Availability

Nonrepudiation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization sets up security policies requiring all employees to attend annual cybersecurity awareness training. What type of control is this?

Technical Control

Operational Control

Managerial Control

Physical Control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company applies data masking to display only the last four digits of customer credit card numbers. What is the main objective of this technique?

Prevent unauthorized access to entire data

Destroy unnecessary data

Replace sensitive values with random tokens

Encrypt data in transmission

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker intercepts sensitive data being transmitted between a client and a server. Which data state was compromised?

Data in use

Data in transit

Data at rest

Data minimized

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company experiences a ransomware attack. They restore operations by using backup files. Which type of control was applied in the recovery process?

Preventive

Detective

Corrective

Directive

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A power outage corrupts some stored customer files, leading to missing information in their records. This is an example of a violation of which principle?

Confidentiality

Integrity

Availability

Compliance

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?