Search Header Logo

Information Security Quiz

Authored by Basil S

Computers

University

Used 1+ times

Information Security Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a core principle of most security models? a) Confidentiality: Protecting information from unauthorized access. b) Integrity: Ensuring information accuracy and completeness. c) Availability: Guaranteeing authorized access to information. d) Transparency: Making security policies and procedures clear.

Confidentiality: Protecting information from unauthorized access

Integrity: Ensuring information accuracy and completeness

Availability: Guaranteeing authorized access to information

Transparency: Making security policies and procedures clear

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a potential source of harm or damage to an information system? a) Vulnerability: A weakness that can be exploited. b) Threat: An actor capable of causing harm. c) Control: A measure to mitigate risk. d) Harm: The negative impact of a security incident.

Vulnerability: A weakness that can be exploited

Threat: An actor capable of causing harm

Control: A measure to mitigate risk

Harm: The negative impact of a security incident

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of harm does data manipulation and corruption fall under? a) Confidentiality breach b) Integrity violation c) Availability disruption d) All of the above

Confidentiality breach

Integrity violation

Availability disruption

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a common vulnerability in software applications? a) Input validation flaws b) Buffer overflows c) Logic errors d) Physical security weaknesses

Input validation flaws

Buffer overflows

Logic errors

Physical security weaknesses

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of access control mechanisms? a) To grant authorized users access to information. b) To prevent unauthorized users from accessing information. c) To track and monitor user activity. d) All of the above

To grant authorized users access to information

To prevent unauthorized users from accessing information

To track and monitor user activity

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between authentication and authorization? a) Authentication verifies identity, while authorization grants permissions. b) Authentication verifies authorization, while authorization restricts access. c) They are the same concept with different names. d) Authentication is for users, while authorization is for systems.

Authentication verifies identity, while authorization grants permissions

Authentication verifies authorization, while authorization restricts access

They are the same concept with different names

Authentication is for users, while authorization is for systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unintentional programming oversights can create vulnerabilities. What is an example of such an oversight? a) Leaving debug code active in production software. b) Using insecure cryptographic algorithms. c) Failing to properly handle user input. d) All of the above

Leaving debug code active in production software

Using insecure cryptographic algorithms

Failing to properly handle user input

All of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?