Module

Module

University

12 Qs

quiz-placeholder

Similar activities

P3 IAS 2 Quiz

P3 IAS 2 Quiz

University

15 Qs

Research Ethics and Data Protection Quiz

Research Ethics and Data Protection Quiz

University

10 Qs

Week 8 Quiz 1 TPC 4 Data Management

Week 8 Quiz 1 TPC 4 Data Management

University

10 Qs

PKI, DMZ & Proxy

PKI, DMZ & Proxy

University

10 Qs

Test

Test

University

15 Qs

SystemResilience

SystemResilience

University

10 Qs

Understanding Encryption Techniques Quiz

Understanding Encryption Techniques Quiz

University

13 Qs

Exploring Information Security Pillars

Exploring Information Security Pillars

University

15 Qs

Module

Module

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Divina 2908

Used 1+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Identify the correct expansion of CNSS.

Committee on National Security Systems

Commission on National Security Solutions

Council for National Systems Security

Committee for National Secure Systems

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

List the three types of controls commonly used to secure databases.


Legal, operational, and financial controls

External, internal, and automated controls

Managerial, technical, and physical controls

Manual, adaptive, and preventive controls

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Explain why physical security alone is no longer sufficient for protecting networked information systems.

Because traditional physical security tools cannot be used in cloud environments

Because most organizations now outsource their IT infrastructure to third parties

Because hardware components are becoming obsolete and need constant upgrades

Because network connectivity introduces new security threats that require digital defenses like firewalls and intrusion detection systems

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Discuss the importance of implementing multi-factor authentication in securing access to sensitive information.

It simplifies the user experience by eliminating the need for passwords

It is a legal requirement for all organizations

It provides an additional layer of security beyond just passwords

It reduces the need for strong passwords

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are the primary differences between symmetric and asymmetric encryption?

Asymmetric encryption is used for data at rest, while symmetric is for data in transit

Symmetric encryption is slower than asymmetric encryption

Symmetric encryption uses a single key, while asymmetric uses a pair of keys

Symmetric encryption is more secure than asymmetric encryption

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What does the acronym DLP stand for in the context of data security?

Data Lifecycle Policy

Data Loss Prevention

Data Leakage Protocol

Digital Loss Protection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the key benefits of using a Virtual Private Network (VPN) for secure internet access?

It improves internet speed by reducing latency

It encrypts internet traffic to protect user privacy

It allows users to bypass geographical restrictions on content

It is a mandatory requirement for all online transactions

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?