Information Assurance and Security 1 PRELIM MP1 FINAL LAB EXAM PQ1 PRELIM EXAM - 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 58

Question 1

Correct
Mark 20.00 out of 20.00

Flag question

Question text
Is roughly equivalent to privacy

Select one:
a.
Integrity

b.
Security

c.
Confidentiality

d.
Availability
Feedback
Your answer is correct.

Question 2
Correct
Mark 20.00 out of 20.00

Flag question

Question text
In information security, data integrity means maintaining and assuring the accuracy and
consistency of data over its entire life-cycle.

Select one:
True
False

Question 3
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Assurance that information is shared only among authorized persons or organizations.

Select one:
a.
Confidentiality

b.
Integrity

c.
Security

d.
Availability
Feedback
Your answer is correct.

Question 4
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Is the process of maintaining an acceptable level of perceived risk

Answer:

Question 5
Correct
Mark 20.00 out of 20.00
Flag question

Question text
Assurance that the information is authentic and complete.

Select one:
a.
Security

b.
Availability

c.
Integrity

d.
Confidentiality
Feedback
Your answer is correct.

Question 1
Correct
Mark 20.00 out of 20.00

Flag question

Question text
It should be: accurate, timely, complete, verifiable, consistent, available.

Select one:
a.
Knowledge
b.
Noise

c.
Information

d.
Data
Feedback
Your answer is correct.

Question 2
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Assurance that the sender is provided with proof of a data delivery and recipient is
provided with proof of the sender’s identity, so that neither can later deny having
processed the data.

Answer:

Question 3
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Protection against unauthorized modification or destruction of information

Answer:

Question 4
Correct
Mark 20.00 out of 20.00
Flag question

Question text
Security measures to establish the validity of a transmission, message, or originator.

Answer:

Question 5
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Assurance that information is not disclosed to unauthorized persons

Answer:

Question 1
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Processed data

Answer:

Question 2
Correct
Mark 20.00 out of 20.00
Flag question

Question text
Is a variety of ongoing measures taken to reduce the likelihood and severity of accidental
and intentional alteration, destruction, misappropriation, misuse,
misconfiguration, unauthorized distribution, and unavailability of an organization’s logical
and physical assets, as the result of action or inaction by insiders and known outsiders, such
as business partners.”

Select one:
a.
Physical Security

b.
IT Security

c.
Personnel Security

d.
Operational Security
Feedback
Your answer is correct.

Question 3
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Three distinct levels:

Select one or more:


a.
Conceptual

b.
Physical

c.
Frameworks

d.
Perceptual

e.
Desired Effects
Feedback
Your answer is correct.

Question 4
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Physical attack and destruction, including: electromagnetic attack, visual spying,
intrusion, scavenging and removal, wiretapping, interference, and eavesdropping.

Select one:
a.
Data

b.
Desired Effects

c.
Attacker's Operations

d.
Information
Feedback
Your answer is correct.

Question 5
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Four Security Domains

Select one or more:


a.
IT Security

b.
Personnel Security

c.
Data Security

d.
Physical Security

e.
Web Security

f.
Operational Security
Feedback
Your answer is correct.

Question 1
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Risk Management Procedure consists of six steps.
Select one or more:
a.
Prioritize countermeasure options

b.
Assess threats

c.
Give feedback to production

d.
Assess vulnerabilities

e.
Assess risks

f.
Assess profitable

g.
Assess assets

h.
Make risk management decisions

i.
Assess productivity
Feedback
Your answer is correct.

Question 2
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Seven Stages of lifecycle model

Select one:
a.
Risk Transfer, Design, Coding, Testing, Deployment, Production and Decommission
b.
Requirements, Design, Trust Mechanism, Testing, Deployment, Production and
Decommission

c.
Requirements, Design, Coding, Testing, Deployment, Production and Decommission

d.
Requirements, Trust, Coding, Testing, Deployment, Production and Decommission
Feedback
Your answer is correct.

Question 3
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Is a generic term that implies a mechanism in place to provide a basis for confidence in the
reliability/security of the system.

Select one:
a.
Risk transfer

b.
Trust

c.
The risk treatment

d.
Trust mechanism
Feedback
Your answer is correct.

Question 4
Correct
Mark 20.00 out of 20.00
Flag question

Question text
Acceptance, avoidance, mitigation, transfer—are with respect to a specific risk for a specific
pary.

Select one:
a.
Trust

b.
The risk treatment

c.
Trust mechanism

d.
Risk transfer
Feedback
Your answer is correct.

Question 5
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Are the security features of a system that provide enforcement of a security policy.

Select one:
a.
Coding

b.
Trust mechanism

c.
Design

d.
Trust
Feedback
Your answer is correct.

Question 1
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Infecting a victim system with a computer trojan, backdoor or other malware application of
this type that ensures the attacker’s presence in the target environment;

Answer:

Question 2
Correct
Mark 20.00 out of 20.00

Flag question

Question text
What are the steps in intrusion model?

Select one:
a.
Recon, Weaponise, Deliver, Exploit, Install, System and Action

b.
System, Weaponise, Deliver, Exploit, Install, C2 and Action
c.
Recon, Weaponise, Deliver, Exploit, Install, C2 and Action

d.
Recon, Weaponise, Deliver, System, Install, C2 and Action
Feedback
Your answer is correct.

Question 3
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Usually an infected host must be accessible outside of the local network to establish a
command and control channel between the victim and the attacker. Once this bidirectional
communication has been made, an attacker has access inside the target environment and
can usually control the activity by manually launching commands;

Answer:

Question 4
Correct
Mark 20.00 out of 20.00

Flag question

Question text
The main ways of transport are e-mails (attachment of infected files), web platforms
(running malware scripts), or removable USB memories;

Select one:
a.
C2
b.
Recon

c.
Delivery

d.
Install
Feedback
Your answer is correct.

Question 5
Correct
Mark 20.00 out of 20.00

Flag question

Question text
These actions typically consist of collecting information, modifying data integrity, or
attacking the availability of services and devices, but the victim system can also be used as a
starting point for infecting other systems or for expanding access to the local network.

Select one:
a.
Exploitation

b.
Installation

c.
Action on objective

d.
Command and Control
Feedback
Your answer is correct.

Question 1
Correct
Mark 20.00 out of 20.00
Flag question

Question text
What are the steps in intrusion model?

Select one:
a.
System, Weaponise, Deliver, Exploit, Install, C2 and Action

b.
Recon, Weaponise, Deliver, System, Install, C2 and Action

c.
Recon, Weaponise, Deliver, Exploit, Install, C2 and Action

d.
Recon, Weaponise, Deliver, Exploit, Install, System and Action
Feedback
Your answer is correct.

Question 2
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Acronym for TCB?

Select one:
a.
Trusted Computer Based

b.
Trusted Computing Base

c.
Trusting Computer Based
d.
Trusting Computing Based
Feedback
Your answer is correct.

Question 3
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Is it true or false. Using encrypted versions of protocols when sensitive information is
exchanged so as to ensure data confidentiality and prevent identity theft is some basic steps
in storing personal data.

Select one:
True
False

Question 4
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Is it true or false. Storage the minimum required data online and maximum discretion in
providing them to a third party (users, companies) is some basic steps in storing personal
data.

Select one:
True
False

Question 5
Correct
Mark 20.00 out of 20.00
Flag question

Question text
The main ways of transport are e-mails (attachment of infected files), web platforms
(running malware scripts), or removable USB memories;

Select one:
a.
Delivery

b.
Install

c.
Recon

d.
C2
Feedback
Your answer is correct.

Question 1
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Those who will see change to their capability and work with core units but are otherwise not
directly affected

Answer:

Question 2
Correct
Mark 20.00 out of 20.00
Flag question

Question text
The ability to provide forensic data attesting that the systems have been used in accordance
with stated security policies.

Select one:
a.
Assurance

b.
Audit

c.
Authentication

d.
Authorization
Feedback
Your answer is correct.

Question 3
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Those who are most affected and achieve most value from the security work

Answer:

Question 4
Correct
Mark 20.00 out of 20.00
Flag question

Question text
Security architecture calls for its own unique set of skills and competencies of the enterprise
and IT architects.

Select one:
True
False

Question 5
Correct
Mark 20.00 out of 20.00

Flag question

Question text
The ability to test and prove that the enterprise architecture has the security attributes
required to uphold the stated security policies.

Select one:
a.
Authentication

b.
Assurance

c.
Authorization

d.
Audit
Feedback
Your answer is correct.

Question 1
Correct
Mark 20.00 out of 20.00
Flag question

Question text
Development of the business scenarios and subsequent high-level use-cases of the project
concerned will bring to attention the people actors and system actors involved. What phase
is that?

Select one:
a.
Phase C: Information System Architecture

b.
Phase B: Business Architecture
c.
Phase A: Architecture Vision

d.
Phase D: Technology Architecture
Feedback
Your answer is correct.

Question 2
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Changes in security requirements are often more disruptive than a simplification or
incremental change. Changes in security policy can be driven by statute, regulation, or
something that has gone wrong. What phase is that?

Select one:
a.
Phase H: Architecture Change Management
b.
Phase F: Migration Planning

c.
Phase G: Implementation Governance

d.
Phase A: Architecture Vision
Feedback
Your answer is correct.

Question 3
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Definition of relevant stakeholders and discovery of their concerns and objectives will
require development of a high-level scenario. What phase is that?

Select one:
a.
Phase D: Technology Architecture

b.
Phase C: Information Systems Architecture

c.
Phase A: Architecture Vision

d.
Phase B: Business Architecture
Feedback
Your answer is correct.

Question 4
Correct
Mark 20.00 out of 20.00
Flag question

Question text
Many security vulnerabilities originate as design or code errors and the simplest and least
expensive method to locate and find such errors is generally an early review by experienced
peers in the craft. What phase is that?

Select one:
a.
Phase A: Architecture Vision

b.
Phase H: Architecture Change Management

c.
Phase B: Business Architecture

d.
Phase G: Implementation Governance
Feedback
Your answer is correct.

Question 5
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Determine who are the legitimate actors who will interact with the product/service/process. What phase is
that?

Select one:
a.
Phase B: Business Architecture
b.
Phase D: Technology Architecture

c.
Phase C: Information Systems Architecture

d.
Phase A: Architecture Vision
Feedback
Your answer is correct.

Question 1
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Security architecture has its own discrete security methodology.

Select one:
True
False

Question 2
Correct
Mark 20.00 out of 20.00

Flag question

Question text
True or False: Codified data/information asset ownership and custody

Select one:
True
False

Question 3
Correct
Mark 20.00 out of 20.00

Flag question

Question text
Those units outside the scoped enterprise who will need to enhance their security
architecture for interoperability purposes

Answer:

Question 4
Correct
Mark 20.00 out of 20.00

Flag question

Question text
True or False: Written and published security policy

Select one:
True
False

Question 5
Correct
Mark 20.00 out of 20.00

Flag question

Question text
True or False: Identify extended enterprise (units) - those units outside the scoped
enterprise who will need to enhance their security architecture for interoperability purposes

Select one:
True
False
Question 1
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Cyber security, also referred to as information technology security, focuses on protecting
computers, networks, programs and data from unintended or unauthorized access, change
or destruction.

Select one:
True
False

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that the information is authentic and complete.

Select one:
a.
Confidentiality

b.
Security

c.
Availability
d.
Integrity
Feedback
Your answer is correct.

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Concept of Cybercrime
Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it may be the
target.

Select one:
True
False

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Availability:Assurance that the systems responsible for delivering, storing and processing
information are accessible when needed, by those who need them.

Select one:
True
False

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is a process, not an end state

Answer:

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Availability: Availability of information refers to ensuring that authorized parties are able to
access the information when needed

Select one:
True
False

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is the process of maintaining an acceptable level of perceived risk

Answer:

Question 8
Correct
Mark 5.00 out of 5.00

Flag question

Question text
Six Concept of CyberCrime

Select one:
a.
Digital Underground, Underground Economy, System, Hacktivism, Cyberwar:Estonia Case
and Stuxnet

b.
Digital Underground, Virus, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet

c.
System, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet

d.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case
and Stuxnet
Feedback
Your answer is correct.

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that information is shared only among authorized persons or organizations.
Select one:
a.
Availability

b.
Security

c.
Integrity

d.
Confidentiality
Feedback
Your answer is correct.

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Cyberspace is "the environment in which communication over computer networks occurs.“

Select one:
True
False

Question 11
Correct
Mark 3.00 out of 3.00

Flag question

Question text
Three Features of Security
Select one:
a.
Confidentiality, Integrity and Security

b.
Confidentiality, Integrity and Availability

c.
CyberSpace, Integrity and Availability

d.
Confidentiality, System and Availability
Feedback
Your answer is correct.

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In information security, data integrity means maintaining and assuring the accuracy and
consistency of data over its entire life-cycle.

Select one:
True
False

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Cybersecurity is the collection of tools, policies, security concepts, security safeguards,
guidelines, risk management approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment and organization and user’s
assets.

Select one:
True
False

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is roughly equivalent to privacy

Select one:
a.
Confidentiality

b.
Availability

c.
Security

d.
Integrity
Feedback
Your answer is correct.

Question 1
Correct
Mark 1.00 out of 1.00

Flag question
Question text
Converting data into information thus requires knowledge

Select one:
a.
Knowledge

b.
Noise

c.
Data

d.
Information
Feedback
Your answer is correct.

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Raw facts with an unknown coding system

Answer:

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Security measures to establish the validity of a transmission, message, or originator.
Answer:

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It should be: accurate, timely, complete, verifiable, consistent, available.

Select one:
a.
Knowledge

b.
Noise

c.
Data

d.
Information
Feedback
Your answer is correct.

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Information and data manipulation abilities in cyberspace;
Select one:
a.
IT Security

b.
Information Infrastructure

c.
Noise

d.
Physical Security
Feedback
Your answer is correct.

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Raw facts with a known coding system

Answer:

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Protection against unauthorized modification or destruction of information

Answer:

Question 8
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Assurance that information is not disclosed to unauthorized persons

Answer:

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Accepted facts, principles, or rules of thumb that are useful for specific domains.

Answer:

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Information Assurance (IA) is the study of how to protect your information assets from
destruction, degradation, manipulation and exploitation.

Select one:
True
False

Question 11
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Is data endowed with relevance and purpose.

Select one:
a.
Knowledge

b.
Noise

c.
Information

d.
Data
Feedback
Your answer is correct.

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Processed data

Answer:

Question 13
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Actions taken that protect and defend information and information systems by ensuring
their availability, integrity, authentication, confidentiality and non-repudiation

Select one:
True
False

Question 14
Correct
Mark 4.00 out of 4.00

Flag question

Question text
Four Security Domain

Select one:
a.
Physical Security, Personnel Security, IT Security and Operational Security

b.
Physical Security, Personnel Security, IT Security and Security

c.
System, Personnel Security, IT Security and Operational Security

d.
Physical Security, Virus, IT Security and Operational Security
Feedback
Your answer is correct.

Question 15
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Timely, reliable access to data and information services for authorized users;

Answer:

Question 16
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Data and data processing activities in physical space;

Select one:
a.
Physical

b.
Physical Security

c.
IT Security

d.
Personnel Security
Feedback
Your answer is correct.

Question 17
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Assurance that the sender is provided with proof of a data delivery and recipient is
provided with proof of the sender’s identity, so that neither can later deny having
processed the data.

Answer:

Question 1
Correct
Mark 3.00 out of 3.00

Flag question

Question text
Three Features of Security

Select one:
a.
Efficient, Integrity and Availability

b.
Confidentiality, Integrity and Availability

c.
Confidentiality, Integrity and Flexible

d.
No Feelings, Integrity and Availability
Feedback
Your answer is correct.

Question 2
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Actions taken that protect and defend information and information systems by ensuring
their availability, integrity, authentication, confidentiality and non-repudiation

Select one:
True
False

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Information Assurance (IA) is the study of how to protect your information assets from
destruction, degradation, manipulation and exploitation.

Select one:
True
False

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Raw facts with an unknown coding system

Answer:
Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is roughly equivalent to privacy

Select one:
a.
Integrity

b.
Confidentiality

c.
Availability

d.
Security
Feedback
Your answer is correct.

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Processed data

Answer:

Question 7
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Physical attack and destruction, including: electromagnetic attack, visual spying,
intrusion, scavenging and removal, wiretapping, interference, and eavesdropping.

Select one:
a.
Data

b.
Attacker's Operations

c.
Information

d.
Desired Effects
Feedback
Your answer is correct.

Question 8
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is the inherent technical features and functions that collectively contribute to an IT
infrastructure achieving and sustaining confidentiality, integrity, availability,
accountability, authenticity, and reliability.”

Answer:
Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Consists of employees, former employees and contractors.

Answer:

Question 10
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Cyberspace is "the environment in which communication over computer networks occurs.“

Select one:
True
False

Question 11
Correct
Mark 1.00 out of 1.00

Flag question

Question text
It should be: accurate, timely, complete, verifiable, consistent, available.
Select one:
a.
Data

b.
Noise

c.
Information

d.
Knowledge
Feedback
Your answer is correct.

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Accepted facts, principles, or rules of thumb that are useful for specific domains.

Answer:

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
To affect the technical performance and the capability of physical systems, to disrupt
the capabilities of the defender.
Select one:
a.
Desired Effects

b.
Perceptual

c.
Attacker's Operations

d.
Noise
Feedback
Your answer is correct.

Question 14
Incorrect
Mark 0.00 out of 1.00

Flag question

Question text
Assurance that the information is authentic and complete.

Select one:
a.
Confidentiality

b.
Integrity

c.
Availability

d.
Security
Feedback
Your answer is incorrect.

Question 15
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is the study of how to protect your information assets from destruction, degradation,
manipulation and exploitation.

Select one:
a.
Confidentiality

b.
Efficient

c.
Integrity

d.
Information Assurance
Feedback
Your answer is correct.

Question 16
Incorrect
Mark 0.00 out of 4.00

Flag question

Question text
Type of Concept for Cybercrime

Select one:
a.
Digital Underground, Efficient Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet

b.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case
and System

c.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case
and Stuxnet

d.
Program, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet
Feedback
Your answer is incorrect.

Question 17
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is a variety of ongoing measures taken to reduce the likelihood and severity of accidental
and intentional alteration, destruction, misappropriation, misuse,
misconfiguration, unauthorized distribution, and unavailability of an organization’s logical
and physical assets, as the result of action or inaction by insiders and known outsiders, such
as business partners.”

Select one:
a.
IT Security

b.
Personnel Security

c.
Physical Security

d.
Operational Security
Feedback
Your answer is correct.

Question 18
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Cyber security, also referred to as information technology security, focuses on protecting
computers, networks, programs and data from unintended or unauthorized access, change
or destruction.

Select one:
True
False

Question 19
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Cybersecurity is the collection of tools, policies, security concepts, security safeguards,
guidelines, risk management approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment and organization and user’s
assets.

Select one:
True
False

Question 20
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Availability: Availability of information refers to ensuring that authorized parties are able to
access the information when needed

Select one:
True
False

Question 21
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Security measures to establish the validity of a transmission, message, or originator.

Answer:

Question 22
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Timely, reliable access to data and information services for authorized users;
Answer:

Question 23
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Information and data manipulation abilities in cyberspace;

Select one:
a.
Physical Security

b.
IT Security

c.
Noise

d.
Information Infrastructure
Feedback
Your answer is correct.

Question 24
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that information is shared only among authorized persons or organizations.
Select one:
a.
Security

b.
Availability

c.
Integrity

d.
Confidentiality
Feedback
Your answer is correct.

Question 25
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Concept of Cybercrime
Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it may be the
target.

Select one:
True
False

Question 26
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Protection against unauthorized modification or destruction of information

Answer:

Question 27
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Involves the implementation of standard operational security procedures that define the
nature and frequency of the interaction between users, systems, and system resources, the
purpose of which is to.

Answer:

Question 28
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Raw facts with a known coding system

Answer:

Question 29
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Assurance that the sender is provided with proof of a data delivery and recipient is
provided with proof of the sender’s identity, so that neither can later deny having
processed the data.

Answer:

Question 30
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Information security technical measures such as: encryption and key management,
intrusion detection, anti-virus software, auditing, redundancy, firewalls, policies and
standards.

Answer:

Question 31
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is the process of maintaining an acceptable level of perceived risk

Answer:
Question 32
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In information security, data integrity means maintaining and assuring the accuracy and
consistency of data over its entire life-cycle.

Select one:
True
False

Question 33
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Converting data into information thus requires knowledge

Select one:
a.
Knowledge

b.
Noise

c.
Information

d.
Data
Feedback
Your answer is correct.

Question 34
Correct
Mark 4.00 out of 4.00

Flag question

Question text
Four Security Domains

Select one or more:


a.
Physical Security

b.
Web Security

c.
Operational Security

d.
Data Security

e.
IT Security

f.
Personnel Security
Feedback
Your answer is correct.

Question 35
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Refers to the protection of hardware, software, and data against physical threats to reduce
or prevent disruptions to operations and services and loss of assets.”
Select one:
a.
Personnel Security

b.
Operational Security

c.
Physical Security
d.
IT Security
Feedback
Your answer is correct.

Question 36
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Data and data processing activities in physical space;

Select one:
a.
Personnel Security

b.
Physical

c.
IT Security

d.
Physical Security
Feedback
Your answer is correct.
Question 37
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is a process, not an end state

Answer:

Question 38
Correct
Mark 3.00 out of 3.00

Flag question

Question text
Three distinct levels:

Select one or more:


a.
Frameworks

b.
Conceptual

c.
Perceptual

d.
Desired Effects

e.
Physical
Feedback
Your answer is correct.

Question 39
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is data endowed with relevance and purpose.

Select one:
a.
Data

b.
Information

c.
Knowledge

d.
Noise
Feedback
Your answer is correct.

Question 40
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Availability:Assurance that the systems responsible for delivering, storing and processing
information are accessible when needed, by those who need them.

Select one:
True
False

You might also like