
Information Security Quiz
Authored by Basil S
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a core principle of most security models? a) Confidentiality: Protecting information from unauthorized access. b) Integrity: Ensuring information accuracy and completeness. c) Availability: Guaranteeing authorized access to information. d) Transparency: Making security policies and procedures clear.
Confidentiality: Protecting information from unauthorized access
Integrity: Ensuring information accuracy and completeness
Availability: Guaranteeing authorized access to information
Transparency: Making security policies and procedures clear
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for a potential source of harm or damage to an information system? a) Vulnerability: A weakness that can be exploited. b) Threat: An actor capable of causing harm. c) Control: A measure to mitigate risk. d) Harm: The negative impact of a security incident.
Vulnerability: A weakness that can be exploited
Threat: An actor capable of causing harm
Control: A measure to mitigate risk
Harm: The negative impact of a security incident
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of harm does data manipulation and corruption fall under? a) Confidentiality breach b) Integrity violation c) Availability disruption d) All of the above
Confidentiality breach
Integrity violation
Availability disruption
All of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a common vulnerability in software applications? a) Input validation flaws b) Buffer overflows c) Logic errors d) Physical security weaknesses
Input validation flaws
Buffer overflows
Logic errors
Physical security weaknesses
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of access control mechanisms? a) To grant authorized users access to information. b) To prevent unauthorized users from accessing information. c) To track and monitor user activity. d) All of the above
To grant authorized users access to information
To prevent unauthorized users from accessing information
To track and monitor user activity
All of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between authentication and authorization? a) Authentication verifies identity, while authorization grants permissions. b) Authentication verifies authorization, while authorization restricts access. c) They are the same concept with different names. d) Authentication is for users, while authorization is for systems.
Authentication verifies identity, while authorization grants permissions
Authentication verifies authorization, while authorization restricts access
They are the same concept with different names
Authentication is for users, while authorization is for systems
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Unintentional programming oversights can create vulnerabilities. What is an example of such an oversight? a) Leaving debug code active in production software. b) Using insecure cryptographic algorithms. c) Failing to properly handle user input. d) All of the above
Leaving debug code active in production software
Using insecure cryptographic algorithms
Failing to properly handle user input
All of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
Computer and Other Human Inventions
Quiz
•
University
10 questions
Python with DataScience
Quiz
•
7th Grade - University
10 questions
UTILITY PROGRAM
Quiz
•
University
10 questions
Data Warehouse - Foundations
Quiz
•
University
13 questions
Digital Technology Office 365 - 29May2020
Quiz
•
University - Professi...
18 questions
LỚP 12 - CHỦ ĐỀ B - BÀI 1 + 2 MẠNG MT VÀ GIAO THỨC
Quiz
•
10th Grade - University
15 questions
GIS Unit III
Quiz
•
University
15 questions
ADB Quiz #1
Quiz
•
University
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
23 questions
Subject Verb Agreement
Quiz
•
9th Grade - University
5 questions
What is Presidents' Day?
Interactive video
•
10th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
20 questions
Mardi Gras History
Quiz
•
6th Grade - University
10 questions
The Roaring 20's Crash Course US History
Interactive video
•
11th Grade - University
17 questions
Review9_TEACHER
Quiz
•
University