Ch02 - Lesson 1 Threats and Attacks Quiz

Ch02 - Lesson 1 Threats and Attacks Quiz

University

15 Qs

quiz-placeholder

Similar activities

MAF682 TECHNOLOGY AND CYBER RISKS

MAF682 TECHNOLOGY AND CYBER RISKS

University

10 Qs

Physical Security

Physical Security

1st Grade - University

10 Qs

HIPAA Compliance

HIPAA Compliance

University - Professional Development

18 Qs

QUIZ 2: Fundamental Concepts of IAS 2

QUIZ 2: Fundamental Concepts of IAS 2

University

15 Qs

CyberWarfare and India's take on it

CyberWarfare and India's take on it

University

10 Qs

Cybercrime

Cybercrime

University

10 Qs

Security Principles Quiz

Security Principles Quiz

University

15 Qs

overview of e-banking management

overview of e-banking management

University

15 Qs

Ch02 - Lesson 1 Threats and Attacks Quiz

Ch02 - Lesson 1 Threats and Attacks Quiz

Assessment

Quiz

Other

University

Medium

Created by

Robin Arcilla

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the primary mission of an information security program?

To enhance user experience

To increase data storage capacity

To ensure information assets remain safe and useful

To improve system performance

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is NOT one of the four important functions of information security?

Protecting the organization's ability to function

Increasing employee productivity

Safeguarding the organization's technology assets

Enabling the safe operation of applications

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Who is responsible for facilitating the security program in an organization?

IT department only

All employees

External consultants

Management (general and IT)

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is a critical aspect of information security regarding data?

Data should be deleted regularly

Data should be stored in the cloud

Data should be protected in transmission, processing, and at rest

Data should be shared with all employees

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What does the term 'vulnerability' refer to in information security?

An intentional act that can damage information

A potential risk to an asset's loss of value

A potential weakness in an asset or its defensive control system

A technique used to compromise a system

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is an example of a software attack?

Human error

Viruses

Fire

Equipment failure

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the definition of an 'attack' in the context of information security?

An intentional or unintentional act that can damage information

A potential risk to an asset

A potential weakness in a system

A technique used to compromise a system

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?