IAS MIDTERM

IAS MIDTERM

University

100 Qs

quiz-placeholder

Similar activities

Câu Hỏi Trắc Nghiệm CNTT Cơ Bản

Câu Hỏi Trắc Nghiệm CNTT Cơ Bản

University

101 Qs

ARCHI

ARCHI

University

102 Qs

C Programming

C Programming

University

100 Qs

Kiến thức về Mạng Neural

Kiến thức về Mạng Neural

University

100 Qs

Table of Content

Table of Content

University

99 Qs

IAS MIDTERM

IAS MIDTERM

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Emmanuele Barrientos

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

100 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of the CIA triad ensures data is not modified without authorization?
Integrity
Availability
Confidentiality
Authenticity
Accountability

Answer explanation

Explanation for the answer (optional)

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image
What is the main purpose of information assurance?
To ensure confidentiality, integrity, and availability of data
To design faster networks
To improve software usability
To upgrade hardware
To replace outdated policies

Answer explanation

Jupiter is a gas giant made primarily of hydrogen and helium. Unlike terrestrial planets that have solid surfaces, gas giants like Jupiter don't have a well-defined solid surface, allowing them to accumulate more mass in a gaseous form. This composition has allowed Jupiter to grow significantly larger than planets with solid surfaces.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image
Which approach uses multiple layers of protection to secure systems?
Defense in depth
Access minimization
Privileged escalation
Static protection
Single-tier strategy

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Media Image
Which component of the CIA triad focuses on restricting data disclosure?
Confidentiality
Availability
Integrity
Auditability
Adaptability

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

The principle of least privilege helps an organization by
Reducing access to only what is necessary for each user
Allowing unlimited access to admins
Increasing employee collaboration
Disabling multi-factor authentication
Sharing all accounts

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which term describes a flaw that an attacker could exploit?
Vulnerability
Threat
Impact
Incident
Control

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A potential event that could exploit a system weakness is called a
Threat
Control
Policy
Incident
Exposure

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?