Information Security Quiz

Information Security Quiz

University

25 Qs

quiz-placeholder

Similar activities

CS-10 Chapter-3 Ethical & Social Issues In ICT Part1: Rabin G.

CS-10 Chapter-3 Ethical & Social Issues In ICT Part1: Rabin G.

10th Grade - University

25 Qs

Vocab Test 1 - Grade 7

Vocab Test 1 - Grade 7

7th Grade - University

20 Qs

ICT Cybersecurity Essentials

ICT Cybersecurity Essentials

10th Grade - University

25 Qs

Cloud Architecting - Week 5

Cloud Architecting - Week 5

University

20 Qs

CyberSecurity LongQuiz (Prelim)

CyberSecurity LongQuiz (Prelim)

University

30 Qs

Literasi Digital 1

Literasi Digital 1

University

20 Qs

Quizzz 1.0

Quizzz 1.0

University

21 Qs

TENTENTENTENENEN

TENTENTENTENENEN

University

25 Qs

Information Security Quiz

Information Security Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Basil S

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the potential for loss or damage to an asset due to a threat?

Harm

Vulnerability

Control

Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the process of verifying the identity of a user or a system?

Control

Authentication

Access Control

Malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the mechanism that restricts the actions or operations that a user or a system can perform on an asset?

Control

Authentication

Access Control

Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the unintentional errors or flaws in a software program that can be exploited by an attacker?

Unintentional Programming Oversights

Malicious Code

Malware

Countermeasures

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the software programs that are designed to harm or disrupt a system or a network?

Unintentional Programming Oversights

Malicious Code

Malware

Countermeasures

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe the actions or techniques that are used to prevent, detect, or mitigate the effects of a threat?

Unintentional Programming Oversights

Malicious Code

Malware

Countermeasures

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a type of threat to information security?

Natural disasters

Human errors

Malicious attacks

Encryption algorithms

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?