ISSD Topic 2

ISSD Topic 2

Professional Development

15 Qs

quiz-placeholder

Similar activities

Part 3.1

Part 3.1

Professional Development

20 Qs

Domains 1 IT Concepts and Terminology

Domains 1 IT Concepts and Terminology

Professional Development

17 Qs

Cloudy Quiz

Cloudy Quiz

Professional Development

10 Qs

DST09 Maintenance

DST09 Maintenance

Professional Development

10 Qs

Risk Management Part 1

Risk Management Part 1

Professional Development

10 Qs

CySa+ PT5: 3 of 3

CySa+ PT5: 3 of 3

9th Grade - Professional Development

20 Qs

Quiz Time!

Quiz Time!

Professional Development

12 Qs

Process Flow and Tools

Process Flow and Tools

Professional Development

20 Qs

ISSD Topic 2

ISSD Topic 2

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Michael Tan

Used 4+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

A group of hardware and software components that work together to perform a useful task is called a ____.

system

portal

operating system

device

2.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Identify the design process to integrate security systems.

(Hint: Select 4 options)

Establish security obejctives

Establish security policies

Determine budgets

Document design basis

Server hardening

3.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Identify the design process to integrate security systems.

(Hint: Select 3 options)

Conduct research

Develop drawings and specify resources

Considerations in research phase

Determine IT systems

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

The protective activities required to prevent unauthorized entry or use of classified or controlled information is called ____.

security countermeasures

document management system

system authentication

incident management

5.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Identify 3 categories of countermeasures.

High technology (Electronic security system)

Low technology (Locks and barriers)

No technology (Policies and procedures)

System integration (Centralized access control)

6.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

When establishing security countermeasures policies, these will involve ____.

(Hint: Select 3 options)

Personnel

Hardware

Software

Weapons

7.

MULTIPLE SELECT QUESTION

2 mins • 1 pt

Identify 3 security budget dimensions.

Countermeasure determination

Prioritization

Phasing

Assets

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?