Five attributes in ISO 27002

Interactive Video
•
Information Technology (IT), Architecture, Social Studies
•
University
•
Hard
Quizizz Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one method to ensure confidentiality in information security?
Using public key infrastructure
Implementing access control lists
Developing a risk management plan
Conducting regular audits
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which model is used to depict information security by focusing on availability, integrity, and confidentiality?
OSI Model
CIA Model
NIST Model
ISO Model
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the five key attributes introduced in the 2022 edition of the cybersecurity standard?
Plan, Do, Check, Act, Review
Identify, Protect, Detect, Respond, Recover
Assess, Mitigate, Monitor, Report, Improve
Analyze, Design, Implement, Test, Deploy
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which framework is harmonized with the cybersecurity concepts of identify, protect, detect, respond, and recover?
TOGAF
NIST CSF
ITIL
COBIT
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT considered an operational capability in information security?
Asset Management
Financial Auditing
Application Security
Governance
Similar Resources on Wayground
2 questions
What is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacks

Interactive video
•
University
2 questions
ISO 27001-2022 and NIST CSF controls

Interactive video
•
University
6 questions
Famous Cyber Security Frameworks

Interactive video
•
University
6 questions
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - What have We Covered in Domain 1?

Interactive video
•
University
2 questions
Practical Cyber Hacking Skills for Beginners - The CIA and DAD Triads

Interactive video
•
University
6 questions
Practical Cyber Hacking Skills for Beginners - The CIA and DAD Triads

Interactive video
•
University
2 questions
Information security for use of cloud services control

Interactive video
•
University
2 questions
Famous Cyber Security Frameworks

Interactive video
•
University
Popular Resources on Wayground
15 questions
Hersheys' Travels Quiz (AM)

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
30 questions
Lufkin Road Middle School Student Handbook & Policies Assessment

Quiz
•
7th Grade
20 questions
Multiplication Facts

Quiz
•
3rd Grade
17 questions
MIXED Factoring Review

Quiz
•
KG - University
10 questions
Laws of Exponents

Quiz
•
9th Grade
10 questions
Characterization

Quiz
•
3rd - 7th Grade
10 questions
Multiply Fractions

Quiz
•
6th Grade