Information Security Principles

Information Security Principles

University

10 Qs

quiz-placeholder

Similar activities

Information Assurance and Security

Information Assurance and Security

University

12 Qs

SSK30343 CNS

SSK30343 CNS

University

15 Qs

Introduction to DBMS

Introduction to DBMS

University

10 Qs

Cryptographic fundamentals for IoT

Cryptographic fundamentals for IoT

University

15 Qs

Activity 1 - IAS 101

Activity 1 - IAS 101

University

12 Qs

SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

Living in the IT Era - Q1

Living in the IT Era - Q1

University

15 Qs

Comp.Sci

Comp.Sci

5th Grade - University

10 Qs

Information Security Principles

Information Security Principles

Assessment

Quiz

Computers

University

Easy

Created by

N M

Used 15+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for in information security?

Control, Information, Availability

Confidentiality, Integrity, Availability

Control, Integrity, Access

Confidentiality, Identity, Access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that demands payment for decryption?

Virus

Trojan

Spyware

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of information assurance?

To ensure data is always available

To monitor network traffic

To maintain confidentiality, integrity, and availability of information

To prevent all types of cyber attacks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a challenge in information security?

Insider threats

Data encryption

Cloud security

Phishing attacks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of information security leaders in modern organizations?

To implement security tools only

To ensure business operations are secure

To manage IT configurations

To focus solely on compliance

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does integrity in the CIA triad refer to?

The speed of data processing

The accessibility of information

The privacy of data

The accuracy and consistency of information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes Advanced Persistent Threats (APTs)?

Short-term attacks that are easy to detect

Long-term targeted attacks that are difficult to detect

Random attacks with no specific target

Attacks that only target mobile devices

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?