IAS - Lesson 1

IAS - Lesson 1

University

15 Qs

quiz-placeholder

Similar activities

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

CHAPTER 3 - SECURITY BREACHES

CHAPTER 3 - SECURITY BREACHES

University

10 Qs

Ethical Hacking

Ethical Hacking

University

20 Qs

Cyber Security Incident Report Quiz

Cyber Security Incident Report Quiz

University

17 Qs

Activity 1 - IAS 101

Activity 1 - IAS 101

University

12 Qs

202309 BMIT27x3 Revision Quiz 2

202309 BMIT27x3 Revision Quiz 2

University

20 Qs

Network Forensics and Log Capturing

Network Forensics and Log Capturing

University

15 Qs

science day competition(Networks & Information Security)

science day competition(Networks & Information Security)

University

15 Qs

IAS - Lesson 1

IAS - Lesson 1

Assessment

Quiz

Computers

University

Medium

Created by

Coo K

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security goal of ensuring that you can access information systems and their data when you need them. They must be available in a dependable and timely manner. This is called?

Availability

Confidentiality

Integrity

Authencity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security goal of ensuring that only authorized persons can access information systems and their data. This is called?

Availability

Confidentiality

Integrity

Authencity

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A successful attack against a vulnerability is called?

external attacker

exploit

patch

risk

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker that has no current relationship with the organization they're attacking is called?

external attacker

internal attacker

physical safeguard

management

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The study and practice of protecting information. The main goal of information security is to protect its confidentiality, integrity, and availability is called?

information security

computer security

physical safeguard

administrative safeguard

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The security goal of ensuring that no changes are made to information systems and their data without permissions is called?

Availability

Confidentiality

Integrity

Authenticity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker that has a current relationship with the organization he or she is attacking. It can be an angry employee. This is called?

external attacker

internal attacker

physical safeguard

subject of an attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?