
Security Strategies in Windows Chapters 1-2 Key Terms
Quiz
•
Other
•
Professional Development
•
Medium
John Doe
Used 1+ times
FREE Resource
55 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Administrative Control (Chapter 1)
Any person or program that attempts to interact with a computer information system in an unauthorized manner.
A management action, written policy, procedure, guideline, regulation, law, or rule of any kind.
Any user (person or program) that possesses permission to access a resource.
The assurance that requested information is available to authorized users upon request.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Attacker (Chapter 1)
Confidentiality, integrity, and availability, which are the goals of information security
Any user (person or program) that possesses permission to access a resource.
The assurance that requested information is available to authorized users upon request.
Any person or program that attempts to interact with a computer information system in an unauthorized manner.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Authorized User (Chapter 1)
Any user (person or program) that possesses permission to access a resource.
The assurance that requested information is available to authorized users upon request.
Confidentiality, integrity, and availability, which are the goals of information security
A collection of computer and network devices connected to one or more networks, generally for the purpose of fulfilling business functions. Also called IT Infrastructure.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Availability (Chapter 1)
A management action, written policy, procedure, guideline, regulation, law, or rule of any kind.
Any person or program that attempts to interact with a computer information system in an unauthorized manner.
The assurance that requested information is available to authorized users upon request.
Any user (person or program) that possesses permission to access a resource.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
C-I-A Triad (Chapter 1)
The assurance that requested information is available to authorized users upon request.
The assurance that information can be accessed and viewed only by authorized users.
Confidentiality, integrity, and availability, which are the goals of information security
A control that repairs the effects of damage from an attack. Corrective controls include virus removal procedures, firewall table updates, and user authorization database updates.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Computer Environment (Chapter 1)
The assurance that information can be accessed and viewed only by authorized users.
A management action, written policy, procedure, guideline, regulation, law, or rule of any kind.
A collection of computer and network devices connected to one or more networks, generally for the purpose of fulfilling business functions. Also called IT Infrastructure.
Any person or program that attempts to interact with a computer information system in an unauthorized manner.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Confidentiality (Chapter 1)
Confidentiality, integrity, and availability, which are the goals of information security
The assurance that information can be accessed and viewed only by authorized users.
Any user (person or program) that possesses permission to access a resource.
A management action, written policy, procedure, guideline, regulation, law, or rule of any kind.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
53 questions
BT Ch-5 Corporate Governance
Quiz
•
Professional Development
50 questions
Linux Command and Protocol Quiz
Quiz
•
Professional Development
60 questions
ADAM Section 4
Quiz
•
Professional Development
51 questions
Career Paddies Quiz 8
Quiz
•
Professional Development
60 questions
TESOL practice on CEFR Overview
Quiz
•
Professional Development
56 questions
Level 2 Cold Water
Quiz
•
Professional Development
55 questions
BASICS OF CHEMISTRY
Quiz
•
Professional Development
56 questions
Đề TM2012 trên istqb.org
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade