Search Header Logo

Ch02 - Lesson 1 Threats and Attacks Quiz

Authored by Robin Arcilla

Other

University

Used 3+ times

Ch02 - Lesson 1 Threats and Attacks Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the primary mission of an information security program?

To enhance user experience

To increase data storage capacity

To ensure information assets remain safe and useful

To improve system performance

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is NOT one of the four important functions of information security?

Protecting the organization's ability to function

Increasing employee productivity

Safeguarding the organization's technology assets

Enabling the safe operation of applications

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Who is responsible for facilitating the security program in an organization?

IT department only

All employees

External consultants

Management (general and IT)

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is a critical aspect of information security regarding data?

Data should be deleted regularly

Data should be stored in the cloud

Data should be protected in transmission, processing, and at rest

Data should be shared with all employees

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What does the term 'vulnerability' refer to in information security?

An intentional act that can damage information

A potential risk to an asset's loss of value

A potential weakness in an asset or its defensive control system

A technique used to compromise a system

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Which of the following is an example of a software attack?

Human error

Viruses

Fire

Equipment failure

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

What is the definition of an 'attack' in the context of information security?

An intentional or unintentional act that can damage information

A potential risk to an asset

A potential weakness in a system

A technique used to compromise a system

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?