
CO2521 Information Security Management - 3 week revision

Quiz
•
Computers
•
University
•
Medium

Christopher Finnigan
Used 3+ times
FREE Resource
16 questions
Show all answers
1.
MATCH QUESTION
1 min • 2 pts
Ensures that information is available to authorized parties
Integrity
Ensures that only authorized parties can view the information.
Confidentiality
Ensures that information is correct and there is no unauthorized modification
Availability
2.
DRAG AND DROP QUESTION
1 min • 3 pts
Assets can be any resource of value to organisation, they can be (a) like a website or they can be (b) such as people and hardware.
Answer explanation
Asset – Any resources that are of value to an organization. (Items to be protected). • An asset can be: • Logical – e.g. website; software information or data. • Physical – e.g. person; hardware or computer system
3.
MATCH QUESTION
1 min • 4 pts
an intentional or unintentional act that causes damage/compromise information or systems
Exploit
a single instance of an information asset suffering damage or destruction.
Loss
an action that has the potential to adversely affect operations and assets.
Threat
the technique used to compromise a system and take advantage of a vulnerability.
Attack
4.
DRAG AND DROP QUESTION
30 sec • 1 pt
A weakness that could allow an attacker to bypass security is (a)
5.
DRAG AND DROP QUESTION
1 min • 1 pt
(a) is the mechanism that represents the matching of an authenticated entity to a list of information assets and corresponding access levels
Answer explanation
Authentication – process by which a control establishes whether a user/ system is the entity it claims to be. • Authorisation – mechanism that represents the matching of an authenticated entity to a list of information assets and corresponding access levels. • Accountability/Auditability – mechanism that records all actions on a system (authorised or unauthorised).
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is NOT a description of Confidentiality?
Ensures that no one other than the intended recipient of a message receives it or is able to read it.
Allows authorised users to access and interact with resources, but it actively prevents unauthorised users from doing so.
Measures to ensure the protection of the secrecy of data, objects, or resources.
Ensures that data remains correct, unaltered, and preserved.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is NOT a description of Integrity?
Protecting the reliability and correctness of data.
Ensures that data remains correct, unaltered, and preserved
Prevents unauthorised alterations of data.
Authorised subjects are granted timely and uninterrupted access to objects.
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Five pillar of information security

Quiz
•
University
20 questions
Operating System Security Quiz

Quiz
•
University
20 questions
CIA Triad Quiz

Quiz
•
University
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
15 questions
Netw2-Quiz No.1 (final term)

Quiz
•
University
15 questions
Cryptography Chap-1

Quiz
•
9th Grade - Professio...
12 questions
Active Directory Quiz

Quiz
•
University
18 questions
SC-900 BootCamp

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade