IS Quiz-Week2 -Security Models

IS Quiz-Week2 -Security Models

University

10 Qs

quiz-placeholder

Similar activities

CLC Unit 2 Lesson 1,2,3 and 4 Quiz

CLC Unit 2 Lesson 1,2,3 and 4 Quiz

University

12 Qs

INFORMATIKA KELAS 7A DAN TB

INFORMATIKA KELAS 7A DAN TB

7th Grade - University

15 Qs

Exploring Software Development and UX

Exploring Software Development and UX

University

15 Qs

Formative #1 - Ethics for IT Professional and IT Users

Formative #1 - Ethics for IT Professional and IT Users

University

10 Qs

Common Webpage Buttons

Common Webpage Buttons

8th Grade - University

10 Qs

Types of Information Security Violations (GROUP 2)

Types of Information Security Violations (GROUP 2)

University

15 Qs

Quiz sobre Pontos de Função

Quiz sobre Pontos de Função

University

10 Qs

ICT and Multimedia Quiz

ICT and Multimedia Quiz

12th Grade - University

14 Qs

IS Quiz-Week2 -Security Models

IS Quiz-Week2 -Security Models

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

ER TN

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the CIA triad stand for in information security?

Control, Integrity, Access

Confidentiality, Integrity, Availability

Control, Information, Availability

Confidentiality, Information, Assurance

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which model is referred to as the DIKW pyramid?

Data, Information, Knowledge, Workflow

Data, Information, Knowledge, Web

Data, Information, Knowledge, Work

Data, Information, Knowledge, Wisdom

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common type of security vulnerability?

Human error

Network speed

Natural disasters

Software updates

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a component of an information system?

Marketing

Data

Software

Hardware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'social engineering' refer to?

Developing software for social networks

Creating social awareness about security

Engineering social media platforms

Manipulating people to gain confidential information

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a software attack?

Denial-of-service

Natural disaster

Human error

Power failure

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

A network security protocol

A software update process

Malware that demands payment for access

A type of phishing attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?