Information Security Quiz

Information Security Quiz

University

11 Qs

quiz-placeholder

Similar activities

enum

enum

University

7 Qs

Q6. Cybersecurity Best Practices

Q6. Cybersecurity Best Practices

University

15 Qs

NISS-DC-Quiz

NISS-DC-Quiz

University

15 Qs

How Cyber Safe Are You?

How Cyber Safe Are You?

University

10 Qs

10 CND M1 Network Attack and Defense Strategies

10 CND M1 Network Attack and Defense Strategies

University

6 Qs

IT Quiz Bee 2025 - DIFFICULT

IT Quiz Bee 2025 - DIFFICULT

University

10 Qs

Introduction to Cybersecurity Quiz

Introduction to Cybersecurity Quiz

9th Grade - University

15 Qs

Access Control (Authorise vs Authenticate)

Access Control (Authorise vs Authenticate)

University

10 Qs

Information Security Quiz

Information Security Quiz

Assessment

Quiz

Information Technology (IT)

University

Hard

Created by

Aulia Rachmawati

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

which one is not included in the key objectives based on the CIA triad?

Integrity

Authenticity

Confidentiality

Availability

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

how to secure integrity?

Access control

Hash function

authentication

version control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ways to secure confidentiality, except

hash

authentication

encryption

access control

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

how to secure availability?

time stamping

access control

protection

hash

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security objectives ensure that public data can be easily accessed?

confidentiality

integrity

availability

authenticity

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security objectives ensure that information can't be modified?

confidentiality

integrity

availability

authenticity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is passive attack?

security attacks that damage system operations

an attack that destroys the operating system

attacks that disrupt the operating system

security attacks that do not damage system operations

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?