Information Assurance Security 2
Information Assurance Security 2
Information Assurance Security 2
1
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Converting data into information thus requires knowledge
Select one:
a.
Data
b.
Information
c.
Noise
d.
Knowledge
Question 2
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Information Assurance (IA) is the study of how to protect your information assets from
destruction, degradation, manipulation and exploitation.
Select one:
True
False
Question 3
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Assurance that the sender is provided with proof of a data delivery and recipient is
provided with proof of the sender’s identity, so that neither can later deny having
processed the data.
non-repudiation
Answer:
Question 4
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Assurance that information is not disclosed to unauthorized persons
confidentiality
Answer:
Question 5
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Processed data
information
Answer:
Question 6
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is data endowed with relevance and purpose.
Select one:
a.
Knowledge
b.
Data
c.
Information
d.
Noise
Question 7
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Protection against unauthorized modification or destruction of information
integrity
Answer:
Question 8
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Accepted facts, principles, or rules of thumb that are useful for specific domains.
know ledge
Answer:
Question 9
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Data and data processing activities in physical space;
Select one:
a.
IT Security
b.
Personnel Security
c.
Physical Security
d.
Physical
Question 10
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Security measures to establish the validity of a transmission, message, or originator.
authentication
Answer:
Question 11
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Actions taken that protect and defend information and information systems by ensuring
their availability, integrity, authentication, confidentiality and non-repudiation
Select one:
True
False
Question 12
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Raw facts with a known coding system
data
Answer:
Question 13
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Raw facts with an unknown coding system
noise
Answer:
Question 14
Complete
Mark 4.00 out of 4.00
Flag question
Question text
Four Security Domain
Select one:
a.
Physical Security, Personnel Security, IT Security and Operational Security
b.
Physical Security, Virus, IT Security and Operational Security
c.
Physical Security, Personnel Security, IT Security and Security
d.
System, Personnel Security, IT Security and Operational Security
Question 15
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Timely, reliable access to data and information services for authorized users;
availability
Answer:
Question 16
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Information and data manipulation abilities in cyberspace;
Select one:
a.
Noise
b.
IT Security
c.
Physical Security
d.
Information Infrastructure
Question 17
Complete
Mark 0.00 out of 1.00
Flag question
Question text
It should be: accurate, timely, complete, verifiable, consistent, available.
Select one:
a.
Knowledge
b.
Noise
c.
Data
d.
Information