Information assurance and security

Information assurance and security

University

25 Qs

quiz-placeholder

Similar activities

Review: Information Assurance and Security

Review: Information Assurance and Security

University

20 Qs

Data Structure

Data Structure

University

20 Qs

ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

University

20 Qs

Cybersecurity Essentials Chapter 2 Review

Cybersecurity Essentials Chapter 2 Review

9th Grade - University

20 Qs

security best practices

security best practices

10th Grade - University

20 Qs

OS2-rsst-quiz in midterm

OS2-rsst-quiz in midterm

University

20 Qs

Pre-Assessment: Distributed Systems III

Pre-Assessment: Distributed Systems III

University

20 Qs

Information Systems Security Quiz

Information Systems Security Quiz

University

23 Qs

Information assurance and security

Information assurance and security

Assessment

Quiz

Computers

University

Hard

Created by

ABDULLAH MUNDAS

Used 30+ times

FREE Resource

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

It is a study of how to protect your information assets from destruction, degredation, manipulation and exploitation. But also, how to recover should any of those happen.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Timely reliable access to data and information services for authorized users.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Protection against unauthorized modification or destruction of information.

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Assurance that information is not disclosed to unauthorized persons.

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

A security measures to establish the validity of transmission, message or originator.

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender's identity, so that neither can later deny having processed the data.

7.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Refers to the protection of hardware, software and data against physical threat's to reduce or prevent disruptions, to operations and loss of assets.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?