MidExam InfoAssuSec2

MidExam InfoAssuSec2

University

50 Qs

quiz-placeholder

Similar activities

ITE 383: Network Security P2 EXAM

ITE 383: Network Security P2 EXAM

University

50 Qs

NetAcad Quiz Questions

NetAcad Quiz Questions

11th Grade - University

48 Qs

Module 13

Module 13

University

52 Qs

BTVI - 2204 Cohort 4 - Midterm Exam

BTVI - 2204 Cohort 4 - Midterm Exam

University

45 Qs

Computer Science Quiz

Computer Science Quiz

University

50 Qs

Syber mid1

Syber mid1

University

46 Qs

  CSCI0613 - Course Packet 1

CSCI0613 - Course Packet 1

University

46 Qs

AWS Cloud Practitioners Essentials

AWS Cloud Practitioners Essentials

University

50 Qs

MidExam InfoAssuSec2

MidExam InfoAssuSec2

Assessment

Quiz

Computers

University

Easy

Created by

Jhenice Sacdalan

Used 7+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Five Information Assurance Pillars?

Confidentiality, Integrity, Availability, Authentication, Authorization

Confidentiality, Integrity, Availability, Authorization, Non-Repudiation

Confidentiality, Integrity, Availability, Authentication, Non-Repudiation

Confidentiality, Integrity, Availability, Authentication, Accountability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Information Assurance?


To ensure the confidentiality, integrity, and availability of information

To delete all information

To provide unlimited access to information

To restrict access to information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of Security Countermeasures in Information Assurance?

To slow down information processing

To protect information systems from threats


To expose information to unauthorized parties


To increase vulnerabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Defense in Depth refer to?

Securing the physical door

Security through layers of a building

Securing only the external perimeter

Securing only the internal part of a building

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is part of the CIA Triangle?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Authentication


Confidentiality, Integrity, and Accountability

Confidentiality, Integrity, and Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Non-repudiation?


Proving the legitimacy of a message or data transfer


Ensuring data is accurate and valid


Protecting data from unauthorized changes

Providing undeniable evidence of authenticity and integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Assets in the context of information security?


Organizational resources being protected

Weaknesses in data confidentiality

Probabilities of threats becoming realities


Parameters implemented to protect data

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?