0% found this document useful (0 votes)
1K views4 pages

c12 Quiz - Attempt Review

This document is a review of a quiz attempt on information security taken on December 12, 2023 at 9:01 AM. The quiz contained 10 multiple choice questions testing knowledge of access controls, authentication methods, the CIA triad, and other information security concepts. The student answered all questions correctly, receiving full marks of 10 out of 10 with a grade of 100%.

Uploaded by

Testya Ramadhin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views4 pages

c12 Quiz - Attempt Review

This document is a review of a quiz attempt on information security taken on December 12, 2023 at 9:01 AM. The quiz contained 10 multiple choice questions testing knowledge of access controls, authentication methods, the CIA triad, and other information security concepts. The student answered all questions correctly, receiving full marks of 10 out of 10 with a grade of 100%.

Uploaded by

Testya Ramadhin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

12/12/23, 9:01 AM c12 Quiz: Attempt review

LITERASI TEKNOLOGI SI-47-GAB4 [FNY]


Dashboard / My courses / FAKULTAS REKAYASA INDUSTRI (FRI) / PRODI S1 SISTEM INFORMASI (FRI) / 2324/1

/ UWI1C2-SI-47-GAB4 / 13. C12 Information Security / c12 Quiz

Started on Tuesday, 12 December 2023, 9:00 AM

State Finished

Completed on Tuesday, 12 December 2023, 9:01 AM

Time taken 58 secs

Marks 10.00/10.00

Grade 100.00 out of 100.00

Question 1

Correct

Mark 1.00 out of 1.00

Which one of the following access control services determines the capabilities of a subject when accessing the
object?

Select one:

a. Audit

b. I&A

c. Authorization 

d. Accountability

Question 2

Correct

Mark 1.00 out of 1.00

Which one of the following authentication methods is necessary to safeguard systems and facilities in high-security
environments?

Select one:

a. A PIN

b. Strong/two-factor authentication 

c. A token

d. Biometrics

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=8107542&cmid=3576313 1/4
12/12/23, 9:01 AM c12 Quiz: Attempt review

Question 3

Correct

Mark 1.00 out of 1.00

Which one of these represents the property of keeping an organization information accurate, without error, and
without unauthorized modification?

Select one:

a. Confidentiality

b. Availability

c. Accountability

d. Integrity 

Question 4

Correct

Mark 1.00 out of 1.00

Which one or more access control categories are sufficient to maintain the CIA triad?

Select one:

a. Detective

b. Compensating 

c. Corrective

d. Preventative

Question 5

Correct

Mark 1.00 out of 1.00

Another name for the information security triad is:

Select one:

a. The FBI triad.

b. The IST triad.

c. The ISS triad.

d. The CIA triad. 

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=8107542&cmid=3576313 2/4
12/12/23, 9:01 AM c12 Quiz: Attempt review

Question 6

Correct

Mark 1.00 out of 1.00

What methods are not used to authenticate identity?

Select one:

a. Something you have

b. Something you know

c. Something you do 

d. Something you are

Question 7

Correct

Mark 1.00 out of 1.00

Risk, as it applies to information technology, is not associated with which one or more of the following items:

Select one:

a. People

b. Principles 

c. Practices

d. Processes

Question 8

Correct

Mark 1.00 out of 1.00

Which one of the following non-discretionary access control techniques limits a subject's access to objects by
examining object data so that the subject's access rights can be determined?

Select one:

a. Role-based

b. Rule-based

c. Time-based

d. Content dependent 

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=8107542&cmid=3576313 3/4
12/12/23, 9:01 AM c12 Quiz: Attempt review

Question 9

Correct

Mark 1.00 out of 1.00

Which one of the following access control administration methods involves distributing the process to localized parts
of the enterprise?

Select one:

a. Centralized

b. Decentralized 

c. RADIUS

d. Hybrid

Question 10

Correct

Mark 1.00 out of 1.00

Which one of the following access control types covers personnel security, monitoring, user and password
management, and permissions management?

Select one:

a. Corrective

b. Technical

c. Administrative 

d. Physical

Previous Activity

Jump to...

Next Activity

https://lms.telkomuniversity.ac.id/mod/quiz/review.php?attempt=8107542&cmid=3576313 4/4

You might also like