QUIZ 2: Fundamental Concepts of IAS 2

QUIZ 2: Fundamental Concepts of IAS 2

University

15 Qs

quiz-placeholder

Similar activities

the internet

the internet

University

16 Qs

InfoSec Chapt 12 Protection Mechanisms

InfoSec Chapt 12 Protection Mechanisms

University

10 Qs

NSTP 2 EXAM - FINALS

NSTP 2 EXAM - FINALS

University

15 Qs

SRWE - Revision

SRWE - Revision

University

14 Qs

LEDP Quiz 2 Review

LEDP Quiz 2 Review

University

17 Qs

Intro to Cybersecurity

Intro to Cybersecurity

University

13 Qs

InfoSec - Chapt. 9 Security Management Practices

InfoSec - Chapt. 9 Security Management Practices

University

10 Qs

Chapter 2: The Digital Economy

Chapter 2: The Digital Economy

University

10 Qs

QUIZ 2: Fundamental Concepts of IAS 2

QUIZ 2: Fundamental Concepts of IAS 2

Assessment

Quiz

Other

University

Practice Problem

Easy

Created by

Brian John Q. Rodriguez

Used 22+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is a set of models, methods, and security principles that align with the organizational objectives and keeps the organization safe from cyber threats.

Controls

Security Architecture

Defense in Depth

CIA Triangle

2.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These are the three layers of information security that are designed and implemented.

Policies, People and Technology (PPT)

CIA Triangle

Security and Operational Controls

Defense in Depth

3.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

These are parameters implemented to protect various forms of data and infrastructure that is important in an organization.

Controls

Security Architecture

Defense in Depth

CIA Triangle

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is the concept used in information security in which multiple layers of security controls are placed throughout an information technology system.

Controls

Security Architecture

Defense in Depth

CIA Triangle

5.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is a part of the CIA Triangle that ensures that the data is accurate, valid, and protected against unauthorized changes.

Confidentiality

Integrity

Availability

Non-Repudiation

6.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is part of the CIA Triangle that ensures data is accessible by those who need it when they need it.

Confidentiality

Integrity

Availability

Non-Repudiation

7.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

There are three basic types of authentications, which of the following is not?

Knowledge-Based Authentication

Property-Based Authentication

Biologically-based Authentication

User-Authentication

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?