Intro Com sec

Intro Com sec

University

20 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

University

23 Qs

MTA Security Fundamentals Lesson 1 Review

MTA Security Fundamentals Lesson 1 Review

10th Grade - Professional Development

21 Qs

Rob 2 Sem. 1 Study Guide

Rob 2 Sem. 1 Study Guide

9th Grade - University

21 Qs

ACM Requirements + Computer Security and Ethics

ACM Requirements + Computer Security and Ethics

University

15 Qs

AACS3013 Quick Revision C1-C3

AACS3013 Quick Revision C1-C3

University

20 Qs

Five pillar of information security

Five pillar of information security

University

15 Qs

Quiz Keamanan Informasi dan Jaringan Komputer

Quiz Keamanan Informasi dan Jaringan Komputer

University

17 Qs

Quiz 1 Introduction To database Concept

Quiz 1 Introduction To database Concept

University

20 Qs

Intro Com sec

Intro Com sec

Assessment

Quiz

Computers

University

Medium

Created by

Leo Lintag

Used 46+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does 'integrity of data' mean?

"Accuracy and completeness of the data"

"Data should be viewable at all times"

"Data should be access by only the right people"

"None of the above"

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive a suspicious email that contains a link to a website. what should you do?

Inform IT about the email and do not open it

"Click on the link and open it to see where it goes"

"Go to the internet explorer and type the link"

"Forward it to a colleague and have them open it first"

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Who you are allowed to give your password to?

"Anybody you trust"

"Only supervisors and authorised IT staff if requested"

"Only IT staff"

"Nobody"

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principles are covered by the CIA triad?

certified, integrated, accessible

continuity, integrity, accessibility

confidentiality, integrity, availability

confidentiality, installation, assembly

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does compliance mean?

providing secure access to user data

using honest means to bypass security measures

conducting tests to identify vulnerabilities in a system

following the rules or standards that have been established

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not considered social engineering?

dumpster diving

convincing people to reveal information

encrypting data to prevent user access until a fee is paid

looking through social media sites for information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The state of being protected against the unauthorized use of information, especially electronic data, or the measures taken to achieve this.

Information Technology

Information Security

Information System

Information

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?