Information Security

Information Security

University

22 Qs

quiz-placeholder

Similar activities

Music Appreciation Renaissance Era

Music Appreciation Renaissance Era

9th Grade - University

20 Qs

HKMNOP C1

HKMNOP C1

University - Professional Development

20 Qs

Ujian  Pilihan Ganda Bahasa Inggris Kelas 5

Ujian Pilihan Ganda Bahasa Inggris Kelas 5

5th Grade - University

20 Qs

India's Food Security System

India's Food Security System

University

23 Qs

Tebak Warna

Tebak Warna

7th Grade - University

20 Qs

Chromatic Solfège

Chromatic Solfège

9th Grade - University

20 Qs

Intro to Music CH 4 Study Guide

Intro to Music CH 4 Study Guide

9th Grade - University

20 Qs

Vernacular Architecture Terms QUIZ

Vernacular Architecture Terms QUIZ

University

20 Qs

Information Security

Information Security

Assessment

Quiz

Arts

University

Medium

Created by

Anitha D

Used 1+ times

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the term which denotes that only authorized users are capable of accessing the information

Confidentiality

Availability

Integrity

Non-repudiation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

State whether True or False: Data encryption is primarily used to ensure confidentiality.

True

False

Cannot be interpreted

None

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the oldest phone hacking technique used by hackers to make free calls.

Spamming

phreaking

cracking

phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following platforms is used for the safety and protection of information in the cloud?

AWS

Cloud workload protection platforms

cloud security protocols

One Drive

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which category does compromising confidential information fall?

Threat

Bug

Attack

Vulnerability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which category does the lack access control policy fall?

Threat

Bug

Attack

Vulnerability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the class of computer threats.

phishing

DOS attack

soliciting

Both B & C

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?