What is one method to ensure confidentiality in information security?
Five attributes in ISO 27002

Interactive Video
•
Information Technology (IT), Architecture, Social Studies
•
University
•
Hard
Quizizz Content
FREE Resource
Read more
5 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Using public key infrastructure
Implementing access control lists
Developing a risk management plan
Conducting regular audits
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which model is used to depict information security by focusing on availability, integrity, and confidentiality?
OSI Model
CIA Model
NIST Model
ISO Model
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the five key attributes introduced in the 2022 edition of the cybersecurity standard?
Plan, Do, Check, Act, Review
Identify, Protect, Detect, Respond, Recover
Assess, Mitigate, Monitor, Report, Improve
Analyze, Design, Implement, Test, Deploy
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which framework is harmonized with the cybersecurity concepts of identify, protect, detect, respond, and recover?
TOGAF
NIST CSF
ITIL
COBIT
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT considered an operational capability in information security?
Asset Management
Financial Auditing
Application Security
Governance
Similar Resources on Quizizz
2 questions
CISSP Crash Course - Control Physical and Logical Access

Interactive video
•
University
6 questions
CISSP Crash Course - Control Physical and Logical Access

Interactive video
•
University
2 questions
Fundamentals of Secure Software - Risk Rating Introduction

Interactive video
•
University
2 questions
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - What have We Covered in Domain 1?

Interactive video
•
University
2 questions
Practical Cyber Hacking Skills for Beginners - The CIA and DAD Triads

Interactive video
•
University
6 questions
Practical Cyber Hacking Skills for Beginners - The CIA and DAD Triads

Interactive video
•
University
2 questions
The CISO Masterclass - Components of Cybersecurity Strategy

Interactive video
•
University
4 questions
Fundamentals of Secure Software - Application Security Goals

Interactive video
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade