Search Header Logo

IAS MIDTERM

Authored by Emmanuele Barrientos

Information Technology (IT)

University

Used 1+ times

IAS MIDTERM
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of the CIA triad ensures data is not modified without authorization?

Integrity
Availability
Confidentiality
Authenticity
Accountability

Answer explanation

Explanation for the answer (optional)

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

What is the main purpose of information assurance?

To ensure confidentiality, integrity, and availability of data
To design faster networks
To improve software usability
To upgrade hardware
To replace outdated policies

Answer explanation

Jupiter is a gas giant made primarily of hydrogen and helium. Unlike terrestrial planets that have solid surfaces, gas giants like Jupiter don't have a well-defined solid surface, allowing them to accumulate more mass in a gaseous form. This composition has allowed Jupiter to grow significantly larger than planets with solid surfaces.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Which approach uses multiple layers of protection to secure systems?

Defense in depth
Access minimization
Privileged escalation
Static protection
Single-tier strategy

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image

Which component of the CIA triad focuses on restricting data disclosure?

Confidentiality
Availability
Integrity
Auditability
Adaptability

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

The principle of least privilege helps an organization by

Reducing access to only what is necessary for each user
Allowing unlimited access to admins
Increasing employee collaboration
Disabling multi-factor authentication
Sharing all accounts

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which term describes a flaw that an attacker could exploit?

Vulnerability
Threat
Impact
Incident
Control

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A potential event that could exploit a system weakness is called a

Threat
Control
Policy
Incident
Exposure

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?