There is 5 principles that jointly contribute to system reliability, which one is the system and its information are available to meet operational and contractual obligation

Quiz SIA2 Chapter 11

Quiz
•
Education
•
University
•
Medium
Gerald Galeno
Used 2+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Security
Privacy
Availability
Confidentiality
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
The time-based model of information security can be expressed in the following formula: P > D + R , what is the symbol P?
The time it takes an attacker to break through the various controls that protect the organization’s information assets.
The time it takes for the organization to detect that an attack is in progress
The time it takes to respond to and stop the attack
The time needed to develop the company.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one is a physical or behavioral characteristic used as an authentication credential??
Defense In Depth
Authentication
Biometric Identifier
Multifactor Authentication
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Routers and firewalls control access by filtering individual packets. Organizations own one or more border routers that connect their internal networks to the Internet Service Provider. Those border routers and the organization’s main firewall use sets of IF-THEN rules, called?
Compability Test
Access Control Lists
Demilitarized Zone
Access Control Matrix
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is the specific purpose of the Router?
A. To control traffic, rather than looking only at the information in the IP and TCP headers.
A. To determine what to do with arriving packets.
A. To determine whether that employee should be allowed to access that resource and perform the requested action.
A. To read the source and destination address fields in IP packet headers to decide where to send (route) the packet next.
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is not a basic step criminals follow to attack information systems?
Find known vulnerabilities
Infect the victim’s network with a virus
Identify potential points of remote entry
Learn as musch as possible about the target and its vulnerabilities
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Systems that create logs of all network traffic that was permitted to pass the firewall and then analyze those logs for signs of attempted or successful intrusions is
A. Intrusion Prevention Systems
B. Computer Incident Response
C. Response Penetration Test
D. Intrusion Detection Systems
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Quiz 1_LIS 309

Quiz
•
University
10 questions
Total Quality Management (TQM)

Quiz
•
University
8 questions
Chapter 1 Intro to Health Psychology

Quiz
•
University
10 questions
Sumit

Quiz
•
University
10 questions
Auditing

Quiz
•
University
10 questions
Information Technology Management Quiz01

Quiz
•
University
10 questions
Management Game

Quiz
•
University
15 questions
Strategic Management

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade