T2 &U2 FT1_IS Quiz

T2 &U2 FT1_IS Quiz

University

25 Qs

quiz-placeholder

Similar activities

Living in the IT Era

Living in the IT Era

University

20 Qs

ISD and Network

ISD and Network

University

20 Qs

SYO 701 INTRO TO SECURITY Module FC

SYO 701 INTRO TO SECURITY Module FC

University

20 Qs

ISC2 - CC - Chapter 1 - Module 3

ISC2 - CC - Chapter 1 - Module 3

University

21 Qs

Tes Diagnostik Kognitif

Tes Diagnostik Kognitif

10th Grade - University

20 Qs

Physical Security Quiz

Physical Security Quiz

9th Grade - University

20 Qs

Network Features and Equipment Quiz

Network Features and Equipment Quiz

12th Grade - University

20 Qs

GCP-FOUND2

GCP-FOUND2

University

20 Qs

T2 &U2 FT1_IS Quiz

T2 &U2 FT1_IS Quiz

Assessment

Quiz

Computers

University

Easy

Created by

NALLARASAN V

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a primary goal of the NSTISSC Security Model?

Increase sales

Ensure data confidentiality, integrity, and availability

Promote open access to data

Reduce software costs

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is "Confidentiality" in Information Security?

Making sure data is accurate

Protecting data from unauthorized access

Ensuring data is available when needed

Sharing information with everyone

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is considered part of the "People" component in an information system?

Computers

Software applications

End users and administrators

Network cables

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which SDLC phase focuses on converting design into actual code?

Design

Implementation

Testing

Maintenance

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes "Availability" in the context of Information Security?

Ensuring data is only available to hackers

Making sure data is accessible to authorized users when needed

Encrypting all data

Deleting unnecessary data

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which phase in the Security SDLC involves monitoring and maintaining security measures?

Design

Implementation

Maintenance

Testing

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the role of "Policies" in securing an information system?

They are optional guidelines

They provide a framework for managing security practices

They slow down system performance

They replace hardware security measures

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?