Information Security Quiz

Information Security Quiz

University

40 Qs

quiz-placeholder

Similar activities

SECURITY

SECURITY

University - Professional Development

40 Qs

CompTIA Security+ Practice Exam 2

CompTIA Security+ Practice Exam 2

University

37 Qs

FE-Practice # 1

FE-Practice # 1

12th Grade - University

40 Qs

NET1L - Lesson 2 (Basic Device Configuration - IP Addressing)

NET1L - Lesson 2 (Basic Device Configuration - IP Addressing)

University

44 Qs

IAS CH1 QUIZ

IAS CH1 QUIZ

University

35 Qs

BTVI - 2204 Cohort 4 - Midterm Exam

BTVI - 2204 Cohort 4 - Midterm Exam

University

45 Qs

 IAS 2 Security Architecture and Design Quiz 3

IAS 2 Security Architecture and Design Quiz 3

University

35 Qs

Chapter10-Routing

Chapter10-Routing

University

38 Qs

Information Security Quiz

Information Security Quiz

Assessment

Quiz

Computers

University

Easy

Created by

JUSTIN PAULO SIRON

Used 2+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The "CIA Triad" in information security stands for:

Control, Inspection, Authorization

Certification, Integrity, Availability

Confidentiality, Integrity, Availability

Cybercrime, Investigation, Action

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary focus of Information Assurance (IA)?

Installing technical controls like firewalls.

Ensuring overall system reliability and trustworthiness through policies and risk management.

Actively responding to hacking attempts in real-time.

Developing software applications.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The relationship between Information Assurance and Information Security is that:

They are the same thing.

Information Security is a subset of Information Assurance.

Information Assurance is a subset of Information Security.

They are completely independent fields.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack that uses deceptive messages to trick users into revealing passwords is called:

A Brute Force Attack

A Denial-of-Service Attack

Phishing

Keylogging

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of a strong password?

It is based on your name or birthday.

It is only 6 characters long.

It uses a common word from the dictionary.

It is long and uses a mix of uppercase, lowercase, numbers, and symbols.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Overwhelming a system to make it unavailable to users is a:

Phishing Attack

Denial-of-Service (DoS) Attack

Insider Threat

Malware Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of multi-factor authentication (MFA)?

To make passwords easier to remember.

To add an extra layer of security beyond just a password.

To replace passwords completely.

To slow down the login process.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?