Information Security Quiz

Information Security Quiz

University

21 Qs

quiz-placeholder

Similar activities

Rob 2 Sem. 1 Study Guide

Rob 2 Sem. 1 Study Guide

9th Grade - University

21 Qs

Day 12 - Networking & Security I - 1st Review - Day 11

Day 12 - Networking & Security I - 1st Review - Day 11

University

20 Qs

Network Security 2

Network Security 2

University

21 Qs

Cryptography Basics

Cryptography Basics

University

20 Qs

035_Cloud-specific Vulnerabilities – CompTIA Security+ –

035_Cloud-specific Vulnerabilities – CompTIA Security+ –

9th Grade - University

20 Qs

Security+ Wireless Security Quiz

Security+ Wireless Security Quiz

University

20 Qs

Week 11 - Stategy & Planning

Week 11 - Stategy & Planning

University

20 Qs

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Information Security Quiz

Information Security Quiz

Assessment

Quiz

Computers

University

Hard

Created by

ANIKET PAUL

Used 14+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the core objectives of the CIA Triad in Information Security?

Confidentiality, Integrity, and Authentication

Confidentiality, Integrity, and Availability

Authentication, Non-repudiation, and Integrity

Encryption, Decryption, and Key Management

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following techniques ensures Confidentiality in the CIA Triad?

Hashing

Data Masking

Checksum Verification

Digital Signatures

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which method ensures data Integrity in Information Security?

Encryption

Hashing

Two-Factor Authentication

Digital Signatures

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of Authentication in Information Security?

Protecting data from unauthorized changes

Ensuring only authorized users can access a system

Keeping data accessible at all times

Encrypting sensitive information

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of Non-repudiation in Information Security?

Preventing unauthorized access

Ensuring that actions or transactions cannot be denied later

Protecting data integrity

Encrypting stored data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of security threat?

Malware

Digital Certificates

Phishing

Buffer Overflow

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of a firewall in network security?

Encrypting stored files

Preventing unauthorized access to a network

Detecting malware on a device

Managing passwords securely

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?