
Information Security Fundamentals
Authored by Angelina CTA]
Computers
11th Grade
Used 31+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
60 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which element of the CIA triad deals with ensuring users only access files they need to do their job?
Authorization
Integrity
Availability
Confidentiality
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
If a file has been altered without permission or knowledge, this violates the principle of ____.
encryption
integrity
least privilege
confidentiality
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What process prevents a user from denying they made changes to a file?
Encryption
Permissions
Nonrepudiation
Secure passwords
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following helps provide confidentiality to data?
A secure password
Encryption
Nonrepudiation
Antimalware
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which security principle is violated by an attack in which users are unable to access their files?
Availability
Principle of least privilege
Integrity
Nonrepudiation
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which security technique is provided by using multiple levels of protection, such as firewalls, antimalware software, and strong password policies?
Integrity
Nonrepudiation
Defense in depth
Principle of least privilege
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following security domains represents the weakest link in the security chain?
Workstation
User
System
LAN
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?