IT308 IAS Quiz No 1 IT3GG1

IT308 IAS Quiz No 1 IT3GG1

University

30 Qs

quiz-placeholder

Similar activities

Quiz kotajako1

Quiz kotajako1

University

25 Qs

Year 9 End of Term Quiz

Year 9 End of Term Quiz

8th Grade - University

28 Qs

Platform Technologies Quiz 1

Platform Technologies Quiz 1

University

26 Qs

IT Essentials Ch 12 Review - Security

IT Essentials Ch 12 Review - Security

University

30 Qs

COMPUTING PRA TEST 1 TAMHIDI USIM

COMPUTING PRA TEST 1 TAMHIDI USIM

University

35 Qs

Security Architecture Course Exam Two

Security Architecture Course Exam Two

University

33 Qs

BAPE 5 Quiz 4 (3A)

BAPE 5 Quiz 4 (3A)

University

30 Qs

Cloud Computing

Cloud Computing

University

25 Qs

IT308 IAS Quiz No 1 IT3GG1

IT308 IAS Quiz No 1 IT3GG1

Assessment

Quiz

Computers

University

Medium

Created by

Edwin Garcia

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the U.S. Government's definition of INFOSEC?

Development of information systems for educational purposes.

Regulation of information systems for commercial use.

Enhancement of information systems for public access.

Protection of information systems against unauthorized access or modification.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When did the origins of information security emerge?

Post Cold War

Post World War II

Post World War I

Post Vietnam War

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the critical characteristics of information according to the C.I.A. Triangle?

Availability, Accuracy, Authenticity

Confidentiality, Integrity, and Availability

Integrity, Availability, Possession

Accuracy, Authenticity, Confidentiality

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the components of an Information System according to the CNSS Security Model?

Software, Hardware, Networks, Protocols, Personnel

Software, Hardware, Networks, Applications, Users

Software, Hardware, Networks, Procedures, People

Software, Hardware, Networks, Databases, Administrators

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the phases of the Security Systems Development Life Cycle (SecSDLC)?

Planning, Execution, Monitoring, Closure

Design, Develop, Test, Deploy

Investigation, Analysis, Logical Design, Physical Design, Implementation, Maintenance, and Change

Initiation, Planning, Execution, Closure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the roles of Security Professionals & Organization?

Senior Management (COO, CTO), Information Security Project Team

Senior Management (CMO, CHRO), Information Security Project Team

Senior Management (CIO, CISO), Information Security Project Team

Senior Management (CEO, CFO), Information Security Project Team

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of Risk in the context of information security?

Probability of unwanted events

Certainty of unwanted events

Certainty of wanted events

Possibility of wanted events

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?