12/12/23, 9:01 AM c12 Quiz: Attempt review
LITERASI TEKNOLOGI SI-47-GAB4 [FNY]
Dashboard / My courses / FAKULTAS REKAYASA INDUSTRI (FRI) / PRODI S1 SISTEM INFORMASI (FRI) / 2324/1
/ UWI1C2-SI-47-GAB4 / 13. C12 Information Security / c12 Quiz
Started on Tuesday, 12 December 2023, 9:00 AM
State Finished
Completed on Tuesday, 12 December 2023, 9:01 AM
Time taken 58 secs
Marks 10.00/10.00
Grade 100.00 out of 100.00
Question 1
Correct
Mark 1.00 out of 1.00
Which one of the following access control services determines the capabilities of a subject when accessing the
object?
Select one:
a. Audit
b. I&A
c. Authorization
d. Accountability
Question 2
Correct
Mark 1.00 out of 1.00
Which one of the following authentication methods is necessary to safeguard systems and facilities in high-security
environments?
Select one:
a. A PIN
b. Strong/two-factor authentication
c. A token
d. Biometrics
https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=8107542&cmid=3576313 1/4
12/12/23, 9:01 AM c12 Quiz: Attempt review
Question 3
Correct
Mark 1.00 out of 1.00
Which one of these represents the property of keeping an organization information accurate, without error, and
without unauthorized modification?
Select one:
a. Confidentiality
b. Availability
c. Accountability
d. Integrity
Question 4
Correct
Mark 1.00 out of 1.00
Which one or more access control categories are sufficient to maintain the CIA triad?
Select one:
a. Detective
b. Compensating
c. Corrective
d. Preventative
Question 5
Correct
Mark 1.00 out of 1.00
Another name for the information security triad is:
Select one:
a. The FBI triad.
b. The IST triad.
c. The ISS triad.
d. The CIA triad.
https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=8107542&cmid=3576313 2/4
12/12/23, 9:01 AM c12 Quiz: Attempt review
Question 6
Correct
Mark 1.00 out of 1.00
What methods are not used to authenticate identity?
Select one:
a. Something you have
b. Something you know
c. Something you do
d. Something you are
Question 7
Correct
Mark 1.00 out of 1.00
Risk, as it applies to information technology, is not associated with which one or more of the following items:
Select one:
a. People
b. Principles
c. Practices
d. Processes
Question 8
Correct
Mark 1.00 out of 1.00
Which one of the following non-discretionary access control techniques limits a subject's access to objects by
examining object data so that the subject's access rights can be determined?
Select one:
a. Role-based
b. Rule-based
c. Time-based
d. Content dependent
https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=8107542&cmid=3576313 3/4
12/12/23, 9:01 AM c12 Quiz: Attempt review
Question 9
Correct
Mark 1.00 out of 1.00
Which one of the following access control administration methods involves distributing the process to localized parts
of the enterprise?
Select one:
a. Centralized
b. Decentralized
c. RADIUS
d. Hybrid
Question 10
Correct
Mark 1.00 out of 1.00
Which one of the following access control types covers personnel security, monitoring, user and password
management, and permissions management?
Select one:
a. Corrective
b. Technical
c. Administrative
d. Physical
Previous Activity
Jump to...
Next Activity
https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=8107542&cmid=3576313 4/4