EHE Module 01: Information Security Fundamentals

EHE Module 01: Information Security Fundamentals

12th Grade

55 Qs

quiz-placeholder

Similar activities

Year 2 Legislation Recap 1

Year 2 Legislation Recap 1

9th - 12th Grade

50 Qs

Cambridge Technical in IT Unit 2 LO1-5

Cambridge Technical in IT Unit 2 LO1-5

12th Grade

60 Qs

TSA Review 6

TSA Review 6

9th - 12th Grade

50 Qs

CSEC IT - 16 Policies & Practices / Licensing Arrangements

CSEC IT - 16 Policies & Practices / Licensing Arrangements

10th - 12th Grade

50 Qs

Online World Mock Exam

Online World Mock Exam

12th Grade - University

56 Qs

3.1 Risks

3.1 Risks

9th - 12th Grade

53 Qs

Final Review: Mass & Social Media

Final Review: Mass & Social Media

9th - 12th Grade

54 Qs

MIL SUMMATIVE

MIL SUMMATIVE

12th Grade

50 Qs

EHE Module 01: Information Security Fundamentals

EHE Module 01: Information Security Fundamentals

Assessment

Quiz

Computers

12th Grade

Medium

Used 5+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of information security?

Ease of use

Well-being of information and infrastructure

Increasing network speed

Reducing software costs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT an element of information security?

Confidentiality

Integrity

Usability

Non-repudiation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a challenge in information security?

Abundance of cybersecurity professionals

Simple privacy regulations

Compliance with government laws and regulations

Easy centralization of security

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a motive behind information security attacks?

Enhancing user experience

Disrupting business continuity

Improving software functionality

Increasing network bandwidth

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a characteristic of passive attacks?

Tampering with data in transit

Intercepting and monitoring network traffic

Using privileged access to violate rules

Tampering with hardware or software

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an active attack?

Sniffing and eavesdropping

Footprinting

Man-in-the-Middle

Network traffic analysis

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves using privileged access to violate rules?

Passive Attack

Insider Attack

Distribution Attack

Close-in Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?