GROUP 7 BLOCK A

GROUP 7 BLOCK A

University

34 Qs

quiz-placeholder

Similar activities

Security Assessments

Security Assessments

University

32 Qs

FIREWALL ️‍🔥

FIREWALL ️‍🔥

University

30 Qs

CompTIA Security Plus

CompTIA Security Plus

University

32 Qs

emerging technology (ai-iot-blockchain)

emerging technology (ai-iot-blockchain)

University

30 Qs

STC - Cyber Security and Forensics

STC - Cyber Security and Forensics

University

30 Qs

IT308 IAS Quiz No 1 IT3GG1

IT308 IAS Quiz No 1 IT3GG1

University

30 Qs

Network Security 3

Network Security 3

University

32 Qs

CyberSecurity LongQuiz (Prelim)

CyberSecurity LongQuiz (Prelim)

University

30 Qs

GROUP 7 BLOCK A

GROUP 7 BLOCK A

Assessment

Quiz

Computers

University

Medium

Created by

Christopher Mamac

Used 34+ times

FREE Resource

34 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

These focus on controls needed to review, analyze, and appropriately prioritize the organization’s activities against ongoing security risks

Control frameworks

Program framework

Risk frameworks

Security Frameworks

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

is to present a higher-level view of the organization’s security efforts.

Control frameworks

Program framework

Risk frameworks

Security Frameworks

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The foundation of all security programs – the specific controls and processes that help protect against threats.

Control frameworks

Program framework

Risk frameworks

Security Frameworks

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Is a set of policies, guidelines, and best practices designed to manage an organization’s information security risks

Control frameworks

Program framework

Risk frameworks

Security Frameworks

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Verifying the identity of users, devices, or applications trying to access resources.

Confidentiality

Integrity

Availability

Authentication

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Determining what authenticated users are allowed to do and access.

Confidentiality

Authorization

Availability

Authentication

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Ensuring that systems and data are accessible to authorized users when needed.

Confidentiality

Authorization

Availability

Authentication

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?