Information Security model exam

Information Security model exam

University

50 Qs

quiz-placeholder

Similar activities

Cryptography and Network Security- cs8792

Cryptography and Network Security- cs8792

University

50 Qs

CNS-QUIZ

CNS-QUIZ

University

46 Qs

IT for life

IT for life

KG - University

55 Qs

Computer Science

Computer Science

University

51 Qs

SOAL UJIAN SEMESTER VI 2025

SOAL UJIAN SEMESTER VI 2025

8th Grade - University

50 Qs

computer networks semester quiz

computer networks semester quiz

University - Professional Development

50 Qs

ITE 383: Network Security P2 EXAM

ITE 383: Network Security P2 EXAM

University

50 Qs

Quiz tentang Malware

Quiz tentang Malware

9th Grade - University

45 Qs

Information Security model exam

Information Security model exam

Assessment

Quiz

Computers

University

Hard

Created by

Thomas Chacko

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary reason why organizations need information security?

To improve the speed of internet connectivity

To ensure the confidentiality, integrity, and availability of data

To reduce the cost of computer hardware

To eliminate the need for physical security measures

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of security ensures that data has not been altered or tampered with?

Confidentiality

Integrity

Non-repudiation

Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principle guarantees that the sender of a message cannot deny sending it later?

Confidentiality

Integrity

Non-repudiation

Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves unauthorized individuals secretly monitoring communications or data?

Active attack

Passive attack

Polymorphic virus

Trojan horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a characteristic of a computer virus?

It can replicate itself.

It requires user intervention to spread.

It operates independently without a host file.

It can attach itself to executable programs.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term best describes the study and practice of hiding messages?

Cryptanalysis

Steganography

Cryptography

Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true about a Trojan horse?

It self-replicates across networks.

It appears to perform legitimate tasks but executes malicious activities.

It is a type of active wiretapping device.

It primarily encrypts data for ransom.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?