IAS2-NW3A

IAS2-NW3A

University

50 Qs

quiz-placeholder

Similar activities

3 курс Cybersecurity Compliance Framework & System Administratio

3 курс Cybersecurity Compliance Framework & System Administratio

University

55 Qs

Syber mid1

Syber mid1

University

46 Qs

IT INFRA-MIDTERM EXAM

IT INFRA-MIDTERM EXAM

University

50 Qs

Weekly Output 2

Weekly Output 2

University

50 Qs

Quiz SPM 7

Quiz SPM 7

University

49 Qs

Post Test 7 Gab 4

Post Test 7 Gab 4

University

50 Qs

F1823

F1823

University

50 Qs

Computer Science Quiz

Computer Science Quiz

University

50 Qs

IAS2-NW3A

IAS2-NW3A

Assessment

Quiz

Computers

University

Easy

Created by

Jhenice Sacdalan

Used 4+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following interpret requirements and apply them to specific situations?

Policies

Standards

Guidelines

Procedure

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

Available Resources

Business needs

Levels of Effort

Projected Costs

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cybersecurity principle is most important when attempting to trace the source of malicious activity?

Availability

Nonrepudiation

Integrity

Confidentiality

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Outsourcing poses the greatest risk to an organization when it involves:

Business Support Services

Core Business Functions

Technology Infrastructure

Cybersecurity Capabilies

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Risk assessments should be performed:

At the start of a program

On a regular basis

When an asset changes

When a vulnerability is discovered

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

During which phase of the system development lifecycle (SDLC) should security first be considered?

Analysis

Planning

Design

Implementation

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Who has the greatest influence over access security in a password authentication environment?

System Administrators

Users

Business Executives

Security Manager

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?