Information Assurance Quiz

Information Assurance Quiz

University

25 Qs

quiz-placeholder

Similar activities

HR SYSTEM- CHAPTER 7

HR SYSTEM- CHAPTER 7

University

20 Qs

MIS for Leader Quiz 2

MIS for Leader Quiz 2

University

20 Qs

PR 1 - QUIZ 1 v.2

PR 1 - QUIZ 1 v.2

11th Grade - University

20 Qs

Business Research Methods

Business Research Methods

University

20 Qs

kriptografi B

kriptografi B

University

20 Qs

Module 3 Quiz – Network Security

Module 3 Quiz – Network Security

University

29 Qs

N110 Week 3 Practice Quiz

N110 Week 3 Practice Quiz

University

20 Qs

Networking Today Quiz

Networking Today Quiz

University

20 Qs

Information Assurance Quiz

Information Assurance Quiz

Assessment

Quiz

Other

University

Medium

Created by

Ma'am Vasquez

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does IA stand for in the context of information security?

Information Assurance

Information Access

Information Analysis

Information Authentication

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the five pillars of Information Assurance?

Availability, Integrity, Authentication, Confidentiality, Non-repudiation

Access, Integrity, Authentication, Confidentiality, Non-repudiation

Availability, Integrity, Authorization, Confidentiality, Non-repudiation

Availability, Integrity, Authentication, Compliance, Non-repudiation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of the CIA triad?

Confidentiality

Integrity

Availability

Authentication

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of confidentiality in information security?

To ensure data is accurate

To prevent unauthorized access to information

To ensure data is available when needed

To provide proof of data origin

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to the assurance that data has not been altered during transmission?

Confidentiality

Integrity

Availability

Non-repudiation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does non-repudiation ensure in information security?

Data is encrypted during transmission

Users cannot deny their actions regarding data

Data is available when needed

Unauthorized users cannot access data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common type of attack that aims to exploit vulnerabilities in information systems?

Data Breach

Data Backup

Data Recovery

Data Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?