What is meant by non-repudiation?
ISC2 - Chapter 1 - Module 1 - G2

Quiz
•
Computers
•
Professional Development
•
Medium
Sebastian Zamorano
Used 64+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If a user does something, they can't later claim that they didn't do it.
Controls to protect the organization's reputation from harm due to inappropriate social media postings by employees, even if on their private accounts and personal time.
It is part of the rules set by administrative controls.
It is a security feature that prevents session replay attacks.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The concept of "secrecy" is most related to which foundational aspect of security?
Confidentiality
Integrity
Availability
Plausibility
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For which of the following assets is integrity probably the most important security aspect?
One frame of a streaming video
The file that contains passwords used to authenticate users
The color scheme of a marketing website
Software that checks the spelling of product descriptions for a retail website
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For which of the following systems would the security concept of availability probably be most important?
Medical systems that store patient data
Retail records of past transactions
Online streaming of camera feeds that display historical works of art in museums around the world
Medical systems that monitor patient condition in an intensive care unit
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a "something you are" authentication factor?
A credit card presented to a cash machine
Your password and PIN
A user ID
A photograph of your face
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Security needs to be provided to ____ data?
Restricted
Illegal
Private
All
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the three pillars of information assurance?
Identification, Authentication, Non-repudiation
Data, User, Infrastructure
Confidentiality, Integrity, Availability
PII, PHI, Sensitive information
Create a free account and access millions of resources
Similar Resources on Quizizz
12 questions
Security I - Day 3 - Review of Day 2

Quiz
•
Professional Development
10 questions
Cybersecurity Concepts

Quiz
•
Professional Development
20 questions
Linkedin CyberSec Test

Quiz
•
Professional Development
15 questions
CEH Study Guide - 13 Cryptography

Quiz
•
Professional Development
16 questions
Pop Quiz 1

Quiz
•
Professional Development
15 questions
Cyber Security Fundamentals

Quiz
•
Professional Development
20 questions
CEH Study Guide - 03 Security Foundations

Quiz
•
Professional Development
15 questions
Sec+ CH.2 Review Test

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade