MidTerm Trivia Quiz Module 1-4

MidTerm Trivia Quiz Module 1-4

University

20 Qs

quiz-placeholder

Similar activities

QUIZ NETWORK REPORT

QUIZ NETWORK REPORT

University

20 Qs

040_An Overview of Malware – CompTIA Security+ SY0-701

040_An Overview of Malware – CompTIA Security+ SY0-701

9th Grade - University

20 Qs

IAS Semi Final Exam

IAS Semi Final Exam

University

25 Qs

Latihan 02 Kemanan Komputer

Latihan 02 Kemanan Komputer

University

16 Qs

Microsoft Server Admin 98-365 Part 6

Microsoft Server Admin 98-365 Part 6

KG - Professional Development

20 Qs

Mitigating Data Loss

Mitigating Data Loss

University

20 Qs

PRINCE2 Lesson 2 Flash Cards

PRINCE2 Lesson 2 Flash Cards

University

20 Qs

MidTerm Trivia Quiz Module 1-4

MidTerm Trivia Quiz Module 1-4

Assessment

Quiz

Computers

University

Easy

Created by

Nicole Behner

Used 5+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Defense is the risk control strategy that attempts to prevent the exploitation of a vulnerability.

False

True

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which document describes how, in the event of a disaster, critical business functions continue at an alternate location while the organization recovers its ability to function at the primary site? Select the best answer.

Disaster Recovery Plan

Business Continuity Plan

Emergency Action Plan

Contingency Plan

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The three critical elements of the C.I.A triad are:

Confidentiality, Integrity, and Accessibility

Confidentiality, Integrity, and Availability

Credibility, Integrity, and Availability

Confidentiality, Identity, and Availability

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A targeted solution to misuse a specific vulnerability is called an __________.

exploit

patch

workaround

remediation

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

________ is the protection of the confidentiality, integrity, and availability of information.

Information security

NIST

Data security

Contingency planning

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The overall planning and development of the contingency planning process is handled by which group?

Contingency Planning Management Team

Crisis Management Team

Emergency Response Team

Risk Assessment Team

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What law attempts to protect the confidentiality and security of healthcare data by establishing and enforcing standards?

FISMA

HITECH

FERPA

HIPAA

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?