
Information Security Quiz

Quiz
•
Computers
•
University
•
Hard
Basil S
Used 1+ times
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a core principle of most security models? a) Confidentiality: Protecting information from unauthorized access. b) Integrity: Ensuring information accuracy and completeness. c) Availability: Guaranteeing authorized access to information. d) Transparency: Making security policies and procedures clear.
Confidentiality: Protecting information from unauthorized access
Integrity: Ensuring information accuracy and completeness
Availability: Guaranteeing authorized access to information
Transparency: Making security policies and procedures clear
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term for a potential source of harm or damage to an information system? a) Vulnerability: A weakness that can be exploited. b) Threat: An actor capable of causing harm. c) Control: A measure to mitigate risk. d) Harm: The negative impact of a security incident.
Vulnerability: A weakness that can be exploited
Threat: An actor capable of causing harm
Control: A measure to mitigate risk
Harm: The negative impact of a security incident
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of harm does data manipulation and corruption fall under? a) Confidentiality breach b) Integrity violation c) Availability disruption d) All of the above
Confidentiality breach
Integrity violation
Availability disruption
All of the above
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a common vulnerability in software applications? a) Input validation flaws b) Buffer overflows c) Logic errors d) Physical security weaknesses
Input validation flaws
Buffer overflows
Logic errors
Physical security weaknesses
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main purpose of access control mechanisms? a) To grant authorized users access to information. b) To prevent unauthorized users from accessing information. c) To track and monitor user activity. d) All of the above
To grant authorized users access to information
To prevent unauthorized users from accessing information
To track and monitor user activity
All of the above
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between authentication and authorization? a) Authentication verifies identity, while authorization grants permissions. b) Authentication verifies authorization, while authorization restricts access. c) They are the same concept with different names. d) Authentication is for users, while authorization is for systems.
Authentication verifies identity, while authorization grants permissions
Authentication verifies authorization, while authorization restricts access
They are the same concept with different names
Authentication is for users, while authorization is for systems
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Unintentional programming oversights can create vulnerabilities. What is an example of such an oversight? a) Leaving debug code active in production software. b) Using insecure cryptographic algorithms. c) Failing to properly handle user input. d) All of the above
Leaving debug code active in production software
Using insecure cryptographic algorithms
Failing to properly handle user input
All of the above
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
HND Computing Unit 17 Network Infrastructure Security

Quiz
•
University - Professi...
18 questions
3.4C Characteristics of computing networks

Quiz
•
University
14 questions
Linux: Users and Groups

Quiz
•
9th Grade - University
15 questions
IC3 GS6 Level 1 Domain 2 Lesson 1

Quiz
•
6th Grade - University
12 questions
Quiz on Basics of Computer Security and SSH

Quiz
•
University
15 questions
DBMS

Quiz
•
University
11 questions
QuizChapter2

Quiz
•
University
10 questions
ESP32 y Firebase en Sistemas Embebidos

Quiz
•
University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Would you rather...

Quiz
•
KG - University
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
10 questions
The Constitution, the Articles, and Federalism Crash Course US History

Interactive video
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
16 questions
Water Modeling Activity

Lesson
•
11th Grade - University
10 questions
ACT English prep

Quiz
•
9th Grade - University