
Information Security Quiz
Authored by Gellie Morada
Information Technology (IT)
University
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is a practical step for individual digital self-protection?
Using software updates
Ignoring antivirus software
Disabling secure connections
Avoiding data backups
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the primary purpose of the InfoSec Triad (CIA)?
To protect information resources
To create backup strategies
To enable phishing detection
To manage access control
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is an example of a malicious breach of data integrity?
A computer power surge corrupts a saved file
An authorized user accidentally deletes important data
A hacker intentionally modifies a student's grades in a university system
Incorrect information is entered into a system during routine tasks
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is an example of an unintentional breach of data integrity?
A hacker gains unauthorized access to a system
A computer power surge corrupts a saved file
An intruder intentionally changes academic records
A deliberate violation of information integrity
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Why is the term "appropriate" in the context of availability considered highly context-dependent?
Because it depends on the user's preferences
Because it varies based on the situation and requirements
Because it is a fixed standard for all scenarios
Because it is irrelevant to information access
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the main function of encryption in information security?
To verify user identity
To manage permissions
To transform data into unreadable cipher text to prevent unauthorized access
To delete resources
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the main advantage of Role-Based Access Control (RBAC) over Access Control Lists (ACL)?
Provides granular control at the individual level.
Separates user management from permission management.
Assigns permissions directly to individual users.
Becomes complex as users and resources grow.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?