Information Security Fundamentals

Information Security Fundamentals

11th Grade

60 Qs

quiz-placeholder

Similar activities

Angleton JH Intro to Robotics Final Exam

Angleton JH Intro to Robotics Final Exam

6th - 12th Grade

60 Qs

Ôn Nghề THVP 2019 phần 1 ( 65 câu )

Ôn Nghề THVP 2019 phần 1 ( 65 câu )

11th Grade

65 Qs

IT Fundamentals 1

IT Fundamentals 1

9th Grade - University

63 Qs

XII Database & SQL

XII Database & SQL

9th - 12th Grade

61 Qs

Year11Revision

Year11Revision

10th - 12th Grade

58 Qs

ÔN TẬP TIN HỌC 3

ÔN TẬP TIN HỌC 3

3rd Grade - University

61 Qs

Test próbny EE.08 (hardware i inne)

Test próbny EE.08 (hardware i inne)

9th - 12th Grade

62 Qs

Career Prep Final

Career Prep Final

9th - 12th Grade

58 Qs

Information Security Fundamentals

Information Security Fundamentals

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

Angelina CTA]

Used 31+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which element of the CIA triad deals with ensuring users only access files they need to do their job?

Authorization

Integrity

Availability

Confidentiality

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

If a file has been altered without permission or knowledge, this violates the principle of ____.

encryption

integrity

least privilege

confidentiality

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What process prevents a user from denying they made changes to a file?

Encryption

Permissions

Nonrepudiation

Secure passwords

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following helps provide confidentiality to data?

A secure password

Encryption

Nonrepudiation

Antimalware

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which security principle is violated by an attack in which users are unable to access their files?

Availability

Principle of least privilege

Integrity

Nonrepudiation

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which security technique is provided by using multiple levels of protection, such as firewalls, antimalware software, and strong password policies?

Integrity

Nonrepudiation

Defense in depth

Principle of least privilege

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following security domains represents the weakest link in the security chain?

Workstation

User

System

LAN

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?