Information Assurance and Security 2- Prelim

Information Assurance and Security 2- Prelim

University

46 Qs

quiz-placeholder

Similar activities

Weekly Output 2

Weekly Output 2

University

50 Qs

Malware Analysis Surprise Test 2

Malware Analysis Surprise Test 2

University

50 Qs

IAS2-NW3A

IAS2-NW3A

University

50 Qs

CIS 110 - Exam Review

CIS 110 - Exam Review

University

46 Qs

CompTIA ITFundamentals CRAM

CompTIA ITFundamentals CRAM

6th Grade - University

46 Qs

Security+ Cryptography Quiz

Security+ Cryptography Quiz

University

45 Qs

Cryptology Tools

Cryptology Tools

University

45 Qs

Ethical Hacking Quiz

Ethical Hacking Quiz

University

50 Qs

Information Assurance and Security 2- Prelim

Information Assurance and Security 2- Prelim

Assessment

Quiz

Computers

University

Medium

Created by

Regino Vll Guinto

Used 1+ times

FREE Resource

46 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best represents the three main goals of information security?

Confidentiality, Integrity, Availability

Protection, Encryption, Authentication

Prevention, Detection, Recovery

Hardware, Software, Network

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does “integrity” in the CIA triad primarily ensure?

Data is protected from unauthorized access

Data is accurate and has not been tampered with

Data is available when needed

Data is encrypted during transmission

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of ensuring confidentiality?

Using encryption to protect sensitive files

Backing up critical business data

Implementing redundancy in servers

Monitoring system logs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which threat directly affects availability?

SQL Injection

Denial-of-Service Attack

Phishing Email

Weak Passwords

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Business continuity planning is primarily designed to ensure:

Recovery after a disruption

Prevention of all cyberattacks

Enforcement of confidentiality

Replacement of firewalls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the Secure Development Lifecycle (SDLC), which phase involves testing applications for vulnerabilities?

Planning

Design

Implementation

Testing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which OWASP Top 10 vulnerability is exploited when user inputs are not sanitized, allowing attackers to run scripts in a victim’s browser?

Injection

Broken Authentication

Cross-Site Scripting (XSS)

Sensitive Data Exposure

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?