IAS2-NW3A

IAS2-NW3A

University

50 Qs

quiz-placeholder

Similar activities

AKT test (151-200)   Жаңа вариант

AKT test (151-200) Жаңа вариант

University

50 Qs

Semi-Final Exam

Semi-Final Exam

University

54 Qs

Dasar Infrastruktur TI (DITI)

Dasar Infrastruktur TI (DITI)

University

50 Qs

IAS101 - Final Quiz

IAS101 - Final Quiz

University

50 Qs

OPERATING SYSTEM

OPERATING SYSTEM

10th Grade - University

50 Qs

unit 2 revision whole unit

unit 2 revision whole unit

11th Grade - University

45 Qs

21st Century Success Skills Exam

21st Century Success Skills Exam

8th Grade - University

45 Qs

CSC 308 ISA MIDTERM EXAM

CSC 308 ISA MIDTERM EXAM

University

45 Qs

IAS2-NW3A

IAS2-NW3A

Assessment

Quiz

Computers

University

Easy

Created by

Jhenice Sacdalan

Used 4+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following interpret requirements and apply them to specific situations?

Policies

Standards

Guidelines

Procedure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

Available Resources

Business needs

Levels of Effort

Projected Costs

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cybersecurity principle is most important when attempting to trace the source of malicious activity?

Availability

Nonrepudiation

Integrity

Confidentiality

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Outsourcing poses the greatest risk to an organization when it involves:

Business Support Services

Core Business Functions

Technology Infrastructure

Cybersecurity Capabilies

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Risk assessments should be performed:

At the start of a program

On a regular basis

When an asset changes

When a vulnerability is discovered

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During which phase of the system development lifecycle (SDLC) should security first be considered?

Analysis

Planning

Design

Implementation

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Who has the greatest influence over access security in a password authentication environment?

System Administrators

Users

Business Executives

Security Manager

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?