Quiz - Materi 1

Quiz - Materi 1

12th Grade

5 Qs

quiz-placeholder

Similar activities

IT Disaster Recovery and Security Quiz

IT Disaster Recovery and Security Quiz

10th Grade - University

10 Qs

Maslow's Hierarchy of Needs

Maslow's Hierarchy of Needs

11th - 12th Grade

10 Qs

CCST Cybersecurity: Objective 3

CCST Cybersecurity: Objective 3

12th Grade

8 Qs

Aer Lingus

Aer Lingus

1st - 12th Grade

10 Qs

ProStart 2- Sales/Pricing/Menu

ProStart 2- Sales/Pricing/Menu

9th - 12th Grade

10 Qs

Communication & Networking - Client Server & Peer to Peer

Communication & Networking - Client Server & Peer to Peer

2nd - 12th Grade

10 Qs

Joint Venture & Hire Purchase Accounts

Joint Venture & Hire Purchase Accounts

12th Grade

10 Qs

Introduction to MS Access 2013

Introduction to MS Access 2013

7th Grade - University

10 Qs

Quiz - Materi 1

Quiz - Materi 1

Assessment

Quiz

Other

12th Grade

Medium

Created by

amrul jakarta

Used 5+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a "something you know"

authentication factor?

User ID

Password

Fingerprint

Iris scan

Answer explanation

B is correct. A password is something the user knows and can present as an

authentication factor to confirm an identity assertion. A is incorrect because a

user ID is an identity assertion, not an authentication factor. C and D are

incorrect as they are examples of authentication factors that are something

you are, also referred to as "biometrics.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Within the organization, who can identify risk.

The security manager

Any security team member

Senior management

Anyone

Answer explanation

D is correct. Anyone within the organization can identify risk.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Of the following, which would probably not be considered a threat?

Natural DIsaster

Unintentional damage to the system caused by a user

A laptop with sensitivie data on it

An external attacker trying to gain unauthorized access to the

environmen

Answer explanation

C is correct. A laptop, and the data on it, are assets, not threats. All the other

answers are examples of threats, as they all have the potential to cause

adverse impact to the organization and the organization's assets.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For which of the following assests is integrity probably the most important

security aspect?

One frame of a streaming video

The file that contains passwords used to authenticate user

The color scheme of a marketing website

Software that checks the spelling of product descriptions for a retaeil

websit

Answer explanation

B is correct. If a password file is modified, the impact to the environment

could be significant; there is a possibility that all authorized users could be

denied access, or that anyone (including unauthorized users) could be granted

access. The integrity of the password file is probably the most crucial of the

four options listed. A is incorrect because one frame of an entire film, if

modified, probably would have little to no effect whatsoever on the value of

the film to the viewer; a film has thousands (or tens of thousands, or millions)

of frames. C is incorrect because a change in marketing material, while

significant, is not as crucial as the integrity of the password file described in

Answer B. D is incorrect because a typo in a product description is not likely

to be as important as the integrity of the password file described in Answer B

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A vendor sells a particular operating system (OS). In order to deploy the OS

securely on different platforms, the vendor publishes several sets of

instructions on how to install it, depending on which platform the customer is

using. This is an example of a ......

Law

Procedure

Standard

Policy

Answer explanation

B is correct. This is a set of instructions to perform a particular task, so it is a

procedure (several procedures, actually—one for each platform). A is

incorrect; the instructions are not a governmental mandate. C is incorrect,

because the instructions are particular to a specific product, not accepted

throughout the industry. D is incorrect, because the instructions are not

particular to a given organization