MidExam InfoAssuSec2

MidExam InfoAssuSec2

University

50 Qs

quiz-placeholder

Similar activities

Usability-UXD

Usability-UXD

University

51 Qs

INTRO TO AI

INTRO TO AI

University

50 Qs

IT alapismeretek

IT alapismeretek

10th Grade - Professional Development

49 Qs

MES3093: QUIZ

MES3093: QUIZ

University

50 Qs

Computer memory

Computer memory

University

45 Qs

Penilain Harian 2

Penilain Harian 2

9th Grade - University

50 Qs

ALGORITHM AND FLOWCHART

ALGORITHM AND FLOWCHART

12th Grade - University

51 Qs

Simulado_Python_ADS

Simulado_Python_ADS

University

52 Qs

MidExam InfoAssuSec2

MidExam InfoAssuSec2

Assessment

Quiz

Computers

University

Practice Problem

Easy

Created by

Jhenice Sacdalan

Used 7+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the Five Information Assurance Pillars?

Confidentiality, Integrity, Availability, Authentication, Authorization

Confidentiality, Integrity, Availability, Authorization, Non-Repudiation

Confidentiality, Integrity, Availability, Authentication, Non-Repudiation

Confidentiality, Integrity, Availability, Authentication, Accountability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Information Assurance?


To ensure the confidentiality, integrity, and availability of information

To delete all information

To provide unlimited access to information

To restrict access to information

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of Security Countermeasures in Information Assurance?

To slow down information processing

To protect information systems from threats


To expose information to unauthorized parties


To increase vulnerabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does Defense in Depth refer to?

Securing the physical door

Security through layers of a building

Securing only the external perimeter

Securing only the internal part of a building

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is part of the CIA Triangle?

Confidentiality, Integrity, and Authorization

Confidentiality, Integrity, and Authentication


Confidentiality, Integrity, and Accountability

Confidentiality, Integrity, and Availability

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Non-repudiation?


Proving the legitimacy of a message or data transfer


Ensuring data is accurate and valid


Protecting data from unauthorized changes

Providing undeniable evidence of authenticity and integrity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Assets in the context of information security?


Organizational resources being protected

Weaknesses in data confidentiality

Probabilities of threats becoming realities


Parameters implemented to protect data

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?