Fundamentals of Information Security Quiz

Fundamentals of Information Security Quiz

11th Grade

17 Qs

quiz-placeholder

Similar activities

Cybersecurity Review

Cybersecurity Review

7th - 12th Grade

20 Qs

MTA Security Fundamentals Lesson 1 Review

MTA Security Fundamentals Lesson 1 Review

10th Grade - Professional Development

21 Qs

Rob 2 Sem. 1 Study Guide

Rob 2 Sem. 1 Study Guide

9th Grade - University

21 Qs

Cybersecurity Codehs

Cybersecurity Codehs

11th - 12th Grade

20 Qs

IBA Lesson 1

IBA Lesson 1

8th - 12th Grade

17 Qs

N+ Chapter 7

N+ Chapter 7

11th - 12th Grade

19 Qs

Workshop - Introduce Of a Wireshark

Workshop - Introduce Of a Wireshark

1st Grade - University

12 Qs

Cybersecurity Vocabulary

Cybersecurity Vocabulary

11th - 12th Grade

20 Qs

Fundamentals of Information Security Quiz

Fundamentals of Information Security Quiz

Assessment

Quiz

Computers

11th Grade

Medium

Created by

Donald Sanders

Used 4+ times

FREE Resource

17 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which element of information security ensures that a recipient receives the original message from the sender without any modifications during transit?

Confidentiality

Integrity

Availability

Non-Repudiation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for a huge network of compromised systems used by attackers to perform denial-of-service attacks?

Botnet

Virus

APT

Keylogger

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which civilian act enforces “Electronic Transactions and Code Set Standards”?

HIPAA

ISO/IEC

PCI/DSS

Sarbanes Oxley Act

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the concept of confidentiality in information security?

Ensuring only authorized users can access information

Making sure information is always available

Verifying the identity of users

Preventing unauthorized changes to data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A keylogger is best described as which type of attack vector?

Hardware attack

Software that records keystrokes

Network-based attack

Physical theft

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a company wants to ensure that its data is always accessible to authorized users, which element of information security should it focus on?

Confidentiality

Integrity

Availability

Authenticity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of an Advanced Persistent Threat (APT)?

stealing information from the victim without being aware of it

A virus that spreads through email attachments

A botnet used for spam

A keylogger installed on a public computer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?