0% found this document useful (0 votes)
3K views

Information Assurance Security 12

The document contains 34 multiple choice questions about various information security concepts such as the four security domains, availability, integrity, cyber security, data security, operational security, and cybercrime. The questions test understanding of key terms like confidentiality, availability, integrity, data, information, knowledge, and security processes like authentication and non-repudiation. True or false and single answer multiple choice questions are included to assess comprehension of foundational information security topics.

Uploaded by

lalo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3K views

Information Assurance Security 12

The document contains 34 multiple choice questions about various information security concepts such as the four security domains, availability, integrity, cyber security, data security, operational security, and cybercrime. The questions test understanding of key terms like confidentiality, availability, integrity, data, information, knowledge, and security processes like authentication and non-repudiation. True or false and single answer multiple choice questions are included to assess comprehension of foundational information security topics.

Uploaded by

lalo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Question 

1
Complete
Mark 4.00 out of 4.00

Flag question

Question text
Four Security Domains

Select one or more:


a.
Personnel Security

b.
IT Security

c.
Physical Security

d.
Web Security

e.
Data Security

f.
Operational Security

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text
 Availability:Assurance that the systems responsible for delivering, storing and processing
information are accessible when needed, by those who need them.

Select one:
True
False

Question 3
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is the inherent technical features and functions that  collectively contribute to an IT
infrastructure achieving and  sustaining confidentiality, integrity, availability,
accountability, authenticity, and reliability.”

IT Security
Answer: 

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is a process, not an end state
Security
Answer: 

Question 5
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Physical attack and destruction, including:  electromagnetic attack, visual spying,
intrusion,  scavenging and removal, wiretapping, interference,  and eavesdropping.
Select one:
a.
Data

b.
Attacker's Operations

c.
Desired Effects

d.
Information

Question 6
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Cyber security, also referred to as information technology security, focuses on protecting
computers, networks, programs and data from unintended or unauthorized access,
change or destruction.

Select one:
True
False

Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is data  endowed with relevance  and purpose.

Select one:
a.
Noise
b.
Information

c.
Data

d.
Knowledge

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Involves the implementation of standard  operational security procedures that define the
nature and  frequency of the interaction between users, systems, and system  resources,
the purpose of which is to.
Operational Security
Answer: 

Question 9
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Information security technical measures  such as:        encryption and key management,
intrusion  detection, anti-virus software, auditing, redundancy,  firewalls, policies and
standards.

Defender's Operations
Answer: 

Question 10
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Converting data into  information thus  requires knowledge

Select one:
a.
Data

b.
Knowledge

c.
Information

d.
Noise

Question 11
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is the process of maintaining an acceptable level of perceived risk   
Security
Answer: 

Question 12
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Actions taken that protect and defend information and  information systems by ensuring
their availability,  integrity, authentication, confidentiality and non-repudiation

Select one:
True
False

Question 13
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Cyberspace is "the environment in which communication over computer networks
occurs.“

Select one:
True
False

Question 14
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is the study of how to protect your  information assets from destruction, degradation,
manipulation and  exploitation.

Select one:
a.
Information Assurance

b.
Integrity

c.
Efficient 

d.
Confidentiality

Question 15
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Raw facts with a known coding system
Data
Answer: 

Question 16
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is a variety of ongoing measures taken to  reduce the likelihood and severity of
accidental and intentional  alteration, destruction, misappropriation, misuse,
misconfiguration,  unauthorized distribution, and unavailability of an organization’s 
logical and physical assets, as the result of action or inaction by  insiders and known
outsiders, such as business partners.”

Select one:
a.
IT Security

b.
Personnel Security

c.
Operational Security

d.
Physical Security

Question 17
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Processed data
Information
Answer: 

Question 18
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Information and data manipulation abilities in cyberspace;

Select one:
a.
Information Infrastructure

b.
Noise

c.
Physical Security

d.
IT Security

Question 19
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Raw facts with an unknown coding system
Noise
Answer: 

Question 20
Complete
Mark 1.00 out of 1.00

Flag question

Question text
In information security, data integrity means maintaining and assuring the accuracy and
consistency of data over its entire life-cycle.

Select one:
True
False

Question 21
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Information Assurance (IA) is the study of how to protect your  information assets from
destruction, degradation, manipulation and  exploitation.   

Select one:
True
False

Question 22
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Refers to the protection of hardware, software,  and data against physical threats to
reduce or prevent disruptions  to operations and services and loss of assets.”
Select one:
a.
IT Security

b.
Physical Security
c.
Personnel Security

d.
Operational Security

Question 23
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Consists of employees, former employees and  contractors.
 

Insiders
Answer: 

Question 24
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is roughly equivalent to privacy

Select one:
a.
Confidentiality
b.
Availability

c.
Security

d.
Integrity

Question 25
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Protection against unauthorized modification or  destruction of information
Integrity
Answer: 

Question 26
Complete
Mark 3.00 out of 3.00

Flag question

Question text
Three Features of Security

Select one:
a.
No Feelings, Integrity and Availability

b.
Confidentiality, Integrity and Flexible

c.
Efficient, Integrity and Availability

d.
Confidentiality, Integrity and Availability

Question 27
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that the sender is provided with proof  of a data delivery and recipient is
provided with proof  of the sender’s identity, so that neither can later deny  having
processed the data.
Non-repudiation
Answer: 

Question 28
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Cybersecurity is the collection of tools, policies, security concepts, security safeguards,
guidelines, risk management approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment and organization and
user’s assets.

Select one:
True
False

Question 29
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Concept of Cybercrime
Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it may be
the target.
Select one:
True
False

Question 30
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Accepted facts, principles, or rules of thumb that are  useful  for specific domains.
Know ledge
Answer: 

Question 31
Complete
Mark 1.00 out of 1.00

Flag question

Question text
To affect the technical performance and the  capability of physical systems, to disrupt
the  capabilities of the defender.

Select one:
a.
Noise

b.
Perceptual

c.
Attacker's Operations

d.
Desired Effects
Question 32
Complete
Mark 0.00 out of 1.00

Flag question

Question text
It should be:  accurate, timely, complete, verifiable, consistent,  available.

Select one:
a.
Knowledge

b.
Noise

c.
Information

d.
Data

Question 33
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Timely, reliable access to data and information  services for authorized users;
Availability
Answer: 

Question 34
Complete
Mark 4.00 out of 4.00

Flag question
Question text
Type of Concept for Cybercrime

Select one:
a.
Program, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and
Stuxnet

b.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia
Case and System

c.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia
Case and Stuxnet

d.
Digital Underground, Efficient Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet

Question 35
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Security measures to establish the validity of a  transmission, message, or originator.

Authentication
Answer: 

Question 36
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that information is shared only among authorized persons or organizations.
Select one:
a.
Integrity

b.
Security

c.
Availability

d.
Confidentiality

Question 37
Complete
Mark 2.00 out of 3.00

Flag question

Question text
Three distinct levels:

Select one or more:


a.
Conceptual

b.
Perceptual

c.
Frameworks

d.
Physical

e.
Desired Effects

Question 38
Complete
Mark 1.00 out of 1.00

Flag question
Question text
Data and data processing activities in physical space;

Select one:
a.
Physical Security

b.
IT Security

c.
Personnel Security

d.
Physical

Question 39
Complete
Mark 0.00 out of 1.00

Flag question

Question text
Assurance that the information is authentic and complete.

Select one:
a.
Integrity

b.
Security

c.
Confidentiality

d.
Availability

Question 40
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Availability: Availability of information refers to ensuring that authorized parties are able
to access the information when needed

Select one:
True
False

You might also like