Information assurance and security

Information assurance and security

University

25 Qs

quiz-placeholder

Similar activities

Security Threats and Trust Boundaries

Security Threats and Trust Boundaries

University

20 Qs

ITS302-Unit2 RC Trial Test 1

ITS302-Unit2 RC Trial Test 1

12th Grade - University

25 Qs

Understanding Software Updates

Understanding Software Updates

10th Grade - University

25 Qs

WLAN SECURITY

WLAN SECURITY

University

20 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

Security

Security

University - Professional Development

20 Qs

Multi Factor Authentication

Multi Factor Authentication

University

20 Qs

Information assurance and security

Information assurance and security

Assessment

Quiz

Computers

University

Hard

Created by

ABDULLAH MUNDAS

Used 30+ times

FREE Resource

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

It is a study of how to protect your information assets from destruction, degredation, manipulation and exploitation. But also, how to recover should any of those happen.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Timely reliable access to data and information services for authorized users.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Protection against unauthorized modification or destruction of information.

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Assurance that information is not disclosed to unauthorized persons.

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

A security measures to establish the validity of transmission, message or originator.

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender's identity, so that neither can later deny having processed the data.

7.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Refers to the protection of hardware, software and data against physical threat's to reduce or prevent disruptions, to operations and loss of assets.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?