
Unit 6 - Information Security Test Review
Authored by Robert Yanowski
Computers
8th Grade
Used 82+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This term defines the state of being complete or uncorrupted.
Domain
Threat
Vulnerability
Integrity
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The term that means making sure a person is who they say they are.
Authorization
Authentication
Availibility
Threat
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The term that defines a network of computers and devices managed as a unit with the same procedures and rules.
Domain
Threat
Risk
Integrity
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The term that states the intent of doing harm.
Domain
Risk
Availability
Threat
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This term defines the gap or weakness which undermines an organization's security efforts.
Authorization
Vulnerability
Risk
Domain
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Procedures used to determine user privileges or access levels to the system is known as what?
Availibility
Authentication
Risk
Authorization
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Information or data which can be accessed when needed is know as what?
Domain
Availability
Risk
Vulnerability
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?