IAS REVIEW

IAS REVIEW

University

60 Qs

quiz-placeholder

Similar activities

Core practice quiz #7

Core practice quiz #7

12th Grade - University

64 Qs

Network+ Days 1 - 12

Network+ Days 1 - 12

University

60 Qs

Information Security and Risk Management Quiz

Information Security and Risk Management Quiz

University

57 Qs

CompTIA N+ N10-009 Mock Test 3 Revision

CompTIA N+ N10-009 Mock Test 3 Revision

University

59 Qs

IMC413 Test 20244

IMC413 Test 20244

University

60 Qs

Professional Ethics in Technology Quiz

Professional Ethics in Technology Quiz

University

55 Qs

COMPUTER SYSTEM ORGANIZATION QUIZ

COMPUTER SYSTEM ORGANIZATION QUIZ

University

60 Qs

NETWORKING

NETWORKING

University

61 Qs

IAS REVIEW

IAS REVIEW

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

John Bernie Ruiz

Used 10+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not part of the CIA triad in security objectives?
Confidentiality
Integrity
Accessibility
Availability

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of security objectives?
To provide encryption methods
To define security attacks
To ensure the confidentiality, integrity, and availability of data
To manage network traffic

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does confidentiality ensure in terms of data?
Data is encrypted at all times
Information is not disclosed to unauthorized entities
Only specific files are available to users
Systems perform their intended functions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to ensuring that data is only changed in an authorized manner?
Data integrity
System integrity
Data authenticity
Nonrepudiation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does system integrity ensure?
Data is encrypted before transmission
The system performs its intended function without unauthorized interference
Users are authenticated before accessing the system
Messages are received as sent

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes availability in the context of security?
Ensures data is not modified
Prevents unauthorized disclosure of information
Ensures that systems work promptly and services are not denied to authorized users
Traces all system actions to a responsible entity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is authenticity concerned with in a security system?
Data confidentiality
Verifying that users are who they claim to be
Detecting passive attacks
System accessibility

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?