0% found this document useful (0 votes)
192 views18 pages

Information Assurance Security 11

This document consists of 33 multiple choice questions about cybersecurity concepts such as data, information, knowledge, security, confidentiality, integrity, availability, and operational security. The questions cover topics like the definition of cybersecurity, features of security, concepts in information assurance, and characteristics of availability, integrity, and confidentiality.

Uploaded by

lalo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
192 views18 pages

Information Assurance Security 11

This document consists of 33 multiple choice questions about cybersecurity concepts such as data, information, knowledge, security, confidentiality, integrity, availability, and operational security. The questions cover topics like the definition of cybersecurity, features of security, concepts in information assurance, and characteristics of availability, integrity, and confidentiality.

Uploaded by

lalo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Question 

1
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Converting data into  information thus  requires knowledge

Select one:
a.
Knowledge

b.
Noise

c.
Information

d.
Data

Question 2
Complete
Mark 0.00 out of 1.00

Flag question

Question text
It should be:  accurate, timely, complete, verifiable, consistent,  available.

Select one:
a.
Information

b.
Data

c.
Knowledge
d.
Noise

Question 3
Complete
Mark 1.00 out of 1.00

Flag question

Question text
To affect the technical performance and the  capability of physical systems, to disrupt
the  capabilities of the defender.

Select one:
a.
Perceptual

b.
Desired Effects

c.
Attacker's Operations

d.
Noise

Question 4
Complete
Mark 4.00 out of 4.00

Flag question

Question text
Four Security Domains

Select one or more:


a.
Web Security

b.
Data Security

c.
Operational Security

d.
Physical Security

e.
IT Security

f.
Personnel Security

Question 5
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Protection against unauthorized modification or  destruction of information
integrity
Answer: 

Question 6
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Refers to the protection of hardware, software,  and data against physical threats to
reduce or prevent disruptions  to operations and services and loss of assets.”

Select one:
a.
Operational Security

b.
Personnel Security
c.
Physical Security
d.
IT Security

Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Accepted facts, principles, or rules of thumb that are  useful  for specific domains.
know ledge
Answer: 

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Actions taken that protect and defend information and  information systems by ensuring
their availability,  integrity, authentication, confidentiality and non-repudiation

Select one:
True
False

Question 9
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Cybersecurity is the collection of tools, policies, security concepts, security safeguards,
guidelines, risk management approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment and organization and
user’s assets.

Select one:
True
False

Question 10
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is a process, not an end state
security
Answer: 

Question 11
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Information security technical measures  such as:        encryption and key management,
intrusion  detection, anti-virus software, auditing, redundancy,  firewalls, policies and
standards.

defender's operations
Answer: 

Question 12
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Timely, reliable access to data and information  services for authorized users;
availability
Answer: 

Question 13
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Consists of employees, former employees and  contractors.
 

insiders
Answer: 

Question 14
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Information and data manipulation abilities in cyberspace;

Select one:
a.
IT Security

b.
Information Infrastructure

c.
Noise

d.
Physical Security
Question 15
Complete
Mark 0.00 out of 4.00

Flag question

Question text
Type of Concept for Cybercrime

Select one:
a.
Digital Underground, Efficient Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet

b.
Program, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and
Stuxnet

c.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia
Case and Stuxnet

d.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia
Case and System

Question 16
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is a variety of ongoing measures taken to  reduce the likelihood and severity of
accidental and intentional  alteration, destruction, misappropriation, misuse,
misconfiguration,  unauthorized distribution, and unavailability of an organization’s 
logical and physical assets, as the result of action or inaction by  insiders and known
outsiders, such as business partners.”

Select one:
a.
Personnel Security

b.
IT Security

c.
Physical Security

d.
Operational Security

Question 17
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Concept of Cybercrime
Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it may be
the target.

Select one:
True
False

Question 18
Complete
Mark 1.00 out of 1.00

Flag question

Question text
In information security, data integrity means maintaining and assuring the accuracy and
consistency of data over its entire life-cycle.

Select one:
True
False

Question 19
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is the study of how to protect your  information assets from destruction, degradation,
manipulation and  exploitation.

Select one:
a.
Information Assurance

b.
Confidentiality

c.
Integrity

d.
Efficient 

Question 20
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is the inherent technical features and functions that  collectively contribute to an IT
infrastructure achieving and  sustaining confidentiality, integrity, availability,
accountability, authenticity, and reliability.”

IT security
Answer: 

Question 21
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Processed data
information
Answer: 

Question 22
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Security measures to establish the validity of a  transmission, message, or originator.

authentication
Answer: 

Question 23
Complete
Mark 3.00 out of 3.00

Flag question

Question text
Three Features of Security

Select one:
a.
No Feelings, Integrity and Availability

b.
Efficient, Integrity and Availability

c.
Confidentiality, Integrity and Flexible
d.
Confidentiality, Integrity and Availability

Question 24
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Cyberspace is "the environment in which communication over computer networks
occurs.“

Select one:
True
False

Question 25
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Availability: Availability of information refers to ensuring that authorized parties are able
to access the information when needed

Select one:
True
False

Question 26
Complete
Mark 1.00 out of 1.00

Flag question
Question text
Raw facts with an unknown coding system
noise
Answer: 

Question 27
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Involves the implementation of standard  operational security procedures that define the
nature and  frequency of the interaction between users, systems, and system  resources,
the purpose of which is to.
operational security
Answer: 

Question 28
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that information is shared only among authorized persons or organizations.

Select one:
a.
Confidentiality

b.
Availability

c.
Security

d.
Integrity

Question 29
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Information Assurance (IA) is the study of how to protect your  information assets from
destruction, degradation, manipulation and  exploitation.   

Select one:
True
False

Question 30
Complete
Mark 0.00 out of 1.00

Flag question

Question text
Assurance that the sender is provided with proof  of a data delivery and recipient is
provided with proof  of the sender’s identity, so that neither can later deny  having
processed the data.
Non repudiation
Answer: 

Question 31
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is data  endowed with relevance  and purpose.

Select one:
a.
Data

b.
Knowledge

c.
Noise

d.
Information

Question 32
Complete
Mark 0.00 out of 1.00

Flag question

Question text
Assurance that the information is authentic and complete.

Select one:
a.
Security

b.
Integrity

c.
Confidentiality

d.
Availability

Question 33
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Cyber security, also referred to as information technology security, focuses on protecting
computers, networks, programs and data from unintended or unauthorized access,
change or destruction.
Select one:
True
False

Question 34
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is the process of maintaining an acceptable level of perceived risk   
security
Answer: 

Question 35
Complete
Mark 2.00 out of 3.00

Flag question

Question text
Three distinct levels:

Select one or more:


a.
Physical

b.
Conceptual

c.
Desired Effects

d.
Perceptual

e.
Frameworks
Question 36
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is roughly equivalent to privacy

Select one:
a.
Security

b.
Integrity

c.
Availability

d.
Confidentiality

Question 37
Complete
Mark 1.00 out of 1.00

Flag question

Question text
 Availability:Assurance that the systems responsible for delivering, storing and processing
information are accessible when needed, by those who need them.

Select one:
True
False

Question 38
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Physical attack and destruction, including:  electromagnetic attack, visual spying,
intrusion,  scavenging and removal, wiretapping, interference,  and eavesdropping.

Select one:
a.
Desired Effects

b.
Information

c.
Data

d.
Attacker's Operations

Question 39
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Raw facts with a known coding system
data
Answer: 

Question 40
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Data and data processing activities in physical space;

Select one:
a.
IT Security

b.
Physical

c.
Personnel Security

d.
Physical Security

You might also like