0% found this document useful (0 votes)
440 views7 pages

Information Assurance and Security 1 Prelim Q1

Cybersecurity involves tools, policies, security concepts, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies used to protect cyber environments, organizations, and users' assets. It focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. Data integrity in information security means maintaining and assuring the accuracy and consistency of data over its entire life-cycle.

Uploaded by

Alec Brent
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
440 views7 pages

Information Assurance and Security 1 Prelim Q1

Cybersecurity involves tools, policies, security concepts, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies used to protect cyber environments, organizations, and users' assets. It focuses on protecting computers, networks, programs, and data from unintended or unauthorized access, change, or destruction. Data integrity in information security means maintaining and assuring the accuracy and consistency of data over its entire life-cycle.

Uploaded by

Alec Brent
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Cybersecurity is the collection of tools, policies, security concepts, security safeguards,

guidelines, risk management approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment and organization and user’s
assets.

Select one:
True 
False

Question 2
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Cyber security, also referred to as information technology security, focuses on protecting
computers, networks, programs and data from unintended or unauthorized access, change
or destruction.

Select one:
True 
False

Question 3
Correct
Mark 1.00 out of 1.00

Flag question

Question text
In information security, data integrity means maintaining and assuring the accuracy and
consistency of data over its entire life-cycle.

Select one:
True 
False

Question 4
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that information is shared only among authorized persons or organizations.

Select one:
a.
Confidentiality

b.
Integrity

c.
Availability

d.
Security
Feedback
Your answer is correct.

Question 5
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Cyberspace is "the environment in which communication over computer networks occurs.“

Select one:
True 
False

Question 6
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is roughly equivalent to privacy

Select one:
a.
Availability

b.
Security

c.
Confidentiality

d.
Integrity
Feedback
Your answer is correct.

Question 7
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is a process, not an end state
Security
Answer: 

Question 8
Correct
Mark 1.00 out of 1.00
Flag question

Question text
Concept of Cybercrime
Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it may be the
target.

Select one:
True 
False

Question 9
Correct
Mark 1.00 out of 1.00

Flag question

Question text
 Availability:Assurance that the systems responsible for delivering, storing and processing
information are accessible when needed, by those who need them.

Select one:
True 
False

Question 10
Correct
Mark 5.00 out of 5.00
Flag question

Question text
Six Concept of CyberCrime

Select one:
a.
Digital Underground, Virus, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet

b.
Digital Underground, Underground Economy, System, Hacktivism, Cyberwar:Estonia Case
and Stuxnet

c.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case
and Stuxnet

d.
System, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet
Feedback
Your answer is correct.

Question 11
Correct
Mark 3.00 out of 3.00

Flag question

Question text
Three Features of Security

Select one:
a.
Confidentiality, System and Availability

b.
Confidentiality, Integrity and Availability
c.
CyberSpace, Integrity and Availability

d.
Confidentiality, Integrity and Security
Feedback
Your answer is correct.

Question 12
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Is the process of maintaining an acceptable level of perceived risk   
Security
Answer: 

Question 13
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that the information is authentic and complete.

Select one:
a.
Security

b.
Integrity
c.
Confidentiality

d.
Availability
Feedback
Your answer is correct.

Question 14
Correct
Mark 1.00 out of 1.00

Flag question

Question text
Availability: Availability of information refers to ensuring that authorized parties are able to
access the information when needed

Select one:
True 
False

You might also like