IAS REVIEW

IAS REVIEW

University

60 Qs

quiz-placeholder

Similar activities

GE IT ERA- Quiz # 1

GE IT ERA- Quiz # 1

University

55 Qs

CompTIA Security+ Lesson 13 Revision

CompTIA Security+ Lesson 13 Revision

University

60 Qs

CPTR363 Cybersecurity Quiz

CPTR363 Cybersecurity Quiz

University

61 Qs

Infasec Reviewer

Infasec Reviewer

University

56 Qs

Section 3 Ch15 Web 2.0

Section 3 Ch15 Web 2.0

University

58 Qs

TECHNOMANIA QUIZ

TECHNOMANIA QUIZ

University

60 Qs

Web Development Quiz

Web Development Quiz

University

60 Qs

Mastering C Programming Concepts

Mastering C Programming Concepts

University

55 Qs

IAS REVIEW

IAS REVIEW

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

John Bernie Ruiz

Used 10+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not part of the CIA triad in security objectives?
Confidentiality
Integrity
Accessibility
Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of security objectives?
To provide encryption methods
To define security attacks
To ensure the confidentiality, integrity, and availability of data
To manage network traffic

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does confidentiality ensure in terms of data?
Data is encrypted at all times
Information is not disclosed to unauthorized entities
Only specific files are available to users
Systems perform their intended functions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to ensuring that data is only changed in an authorized manner?
Data integrity
System integrity
Data authenticity
Nonrepudiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does system integrity ensure?
Data is encrypted before transmission
The system performs its intended function without unauthorized interference
Users are authenticated before accessing the system
Messages are received as sent

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes availability in the context of security?
Ensures data is not modified
Prevents unauthorized disclosure of information
Ensures that systems work promptly and services are not denied to authorized users
Traces all system actions to a responsible entity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is authenticity concerned with in a security system?
Data confidentiality
Verifying that users are who they claim to be
Detecting passive attacks
System accessibility

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?