IT3101-IAS-PLE

IT3101-IAS-PLE

Professional Development

50 Qs

quiz-placeholder

Similar activities

PowerBI - Part I

PowerBI - Part I

Professional Development

51 Qs

Quiz on SSH, NFS, and SMB

Quiz on SSH, NFS, and SMB

Professional Development

51 Qs

03 Secure Coding  APIs

03 Secure Coding APIs

Professional Development

50 Qs

Budaya Kaminfo

Budaya Kaminfo

Professional Development

50 Qs

nghiệp vụ chung 101-150

nghiệp vụ chung 101-150

Professional Development

50 Qs

Peran AI dalam Kehidupan Sehari-hari

Peran AI dalam Kehidupan Sehari-hari

Professional Development

45 Qs

nghiệp vụ TD 101-150

nghiệp vụ TD 101-150

Professional Development

50 Qs

1. Presentaciones: Variedad y Formatos

1. Presentaciones: Variedad y Formatos

Professional Development

53 Qs

IT3101-IAS-PLE

IT3101-IAS-PLE

Assessment

Quiz

Information Technology (IT)

Professional Development

Practice Problem

Hard

Created by

Ardi Moran

Used 9+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker modifies financial records to insert fraudulent transactions. Which triad(s) were directly violated?

CIA – Availability only

CIA – Confidentiality and Integrity

CIA – Integrity only

DAD – Denial and Disclosure

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a flood destroyed its primary data center, a company relied on its secondary backup facility to restore operations. Which CIA principle was preserved by this action?

Confidentiality

Integrity

Availability

Nonrepudiation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization sets up security policies requiring all employees to attend annual cybersecurity awareness training. What type of control is this?

Technical Control

Operational Control

Managerial Control

Physical Control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company applies data masking to display only the last four digits of customer credit card numbers. What is the main objective of this technique?

Prevent unauthorized access to entire data

Destroy unnecessary data

Replace sensitive values with random tokens

Encrypt data in transmission

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker intercepts sensitive data being transmitted between a client and a server. Which data state was compromised?

Data in use

Data in transit

Data at rest

Data minimized

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company experiences a ransomware attack. They restore operations by using backup files. Which type of control was applied in the recovery process?

Preventive

Detective

Corrective

Directive

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A power outage corrupts some stored customer files, leading to missing information in their records. This is an example of a violation of which principle?

Confidentiality

Integrity

Availability

Compliance

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?