Information Security Quiz2

Information Security Quiz2

University

15 Qs

quiz-placeholder

Similar activities

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Unauthorized Access and Modification

Unauthorized Access and Modification

University

15 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

10 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

Quiz Cyber Security Risk @work TREG7

Quiz Cyber Security Risk @work TREG7

University

16 Qs

Device Hardening

Device Hardening

University

20 Qs

Security Threats and Trust Boundaries

Security Threats and Trust Boundaries

University

20 Qs

Topic 10: Applications Development for the Digital Firm

Topic 10: Applications Development for the Digital Firm

University

15 Qs

Information Security Quiz2

Information Security Quiz2

Assessment

Quiz

Computers

University

Hard

Created by

Kenneth Hernandez

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What field focuses on managing risks associated with using, processing, storing, and transferring data?

Information Technology

Information Assurance

Cybersecurity

Data Science

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security measure ensures that information is not disclosed to unauthorized individuals or devices?

Authenticity

Confidentiality

Integrity

Availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does integrity refer to in terms of information security?

Ensuring authorized users have access to information

Encryption of highly confidential data

Safeguarding the accuracy and completeness of information

Verifying an individual's authorization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security attribute establishes the validity of a transmission or originator?

Authenticity

Non-repudiation

Confidentiality

Integrity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does non-repudiation assure in terms of data transmission?

Proof of sender's identity

Timely access to information services

Encryption of data

Proof of delivery for the recipient

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which discipline focuses on developing tools and countermeasures to protect information from external threats?

Information Technology

Data Science

Information Security

Network Administration

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was the commentator's analogy to describe the SolarWinds cyber-attack?

The Digital Tsunami

IT's Pearl Harbor

Cyber Warfare

The Digital Apocalypse

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?