Information Security model exam

Information Security model exam

University

50 Qs

quiz-placeholder

Similar activities

VIRUS AND ANTIVIRUS

VIRUS AND ANTIVIRUS

10th Grade - University

50 Qs

python_midterm

python_midterm

University

45 Qs

MCTCC0113

MCTCC0113

University

50 Qs

CNS IAT 2

CNS IAT 2

University

50 Qs

Quiz Informatika Kelas 9

Quiz Informatika Kelas 9

9th Grade - University

50 Qs

SOCRATECHS

SOCRATECHS

1st Grade - Professional Development

50 Qs

Cyber security-1

Cyber security-1

University

51 Qs

Pra UAS KPI

Pra UAS KPI

University

50 Qs

Information Security model exam

Information Security model exam

Assessment

Quiz

Computers

University

Hard

Created by

Thomas Chacko

Used 1+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a primary reason why organizations need information security?

To improve the speed of internet connectivity

To ensure the confidentiality, integrity, and availability of data

To reduce the cost of computer hardware

To eliminate the need for physical security measures

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which principle of security ensures that data has not been altered or tampered with?

Confidentiality

Integrity

Non-repudiation

Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which security principle guarantees that the sender of a message cannot deny sending it later?

Confidentiality

Integrity

Non-repudiation

Availability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack involves unauthorized individuals secretly monitoring communications or data?

Active attack

Passive attack

Polymorphic virus

Trojan horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is not a characteristic of a computer virus?

It can replicate itself.

It requires user intervention to spread.

It operates independently without a host file.

It can attach itself to executable programs.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term best describes the study and practice of hiding messages?

Cryptanalysis

Steganography

Cryptography

Authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true about a Trojan horse?

It self-replicates across networks.

It appears to perform legitimate tasks but executes malicious activities.

It is a type of active wiretapping device.

It primarily encrypts data for ransom.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?