Information Assurance and Security 1 Prelim Q1
Information Assurance and Security 1 Prelim Q1
guidelines, risk management approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment and organization and user’s
assets.
Select one:
True
False
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Cyber security, also referred to as information technology security, focuses on protecting
computers, networks, programs and data from unintended or unauthorized access, change
or destruction.
Select one:
True
False
Question 3
Correct
Mark 1.00 out of 1.00
Flag question
Question text
In information security, data integrity means maintaining and assuring the accuracy and
consistency of data over its entire life-cycle.
Select one:
True
False
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Assurance that information is shared only among authorized persons or organizations.
Select one:
a.
Confidentiality
b.
Integrity
c.
Availability
d.
Security
Feedback
Your answer is correct.
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Cyberspace is "the environment in which communication over computer networks occurs.“
Select one:
True
False
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Is roughly equivalent to privacy
Select one:
a.
Availability
b.
Security
c.
Confidentiality
d.
Integrity
Feedback
Your answer is correct.
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Is a process, not an end state
Security
Answer:
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Concept of Cybercrime
Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it may be the
target.
Select one:
True
False
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Availability:Assurance that the systems responsible for delivering, storing and processing
information are accessible when needed, by those who need them.
Select one:
True
False
Question 10
Correct
Mark 5.00 out of 5.00
Flag question
Question text
Six Concept of CyberCrime
Select one:
a.
Digital Underground, Virus, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet
b.
Digital Underground, Underground Economy, System, Hacktivism, Cyberwar:Estonia Case
and Stuxnet
c.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case
and Stuxnet
d.
System, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet
Feedback
Your answer is correct.
Question 11
Correct
Mark 3.00 out of 3.00
Flag question
Question text
Three Features of Security
Select one:
a.
Confidentiality, System and Availability
b.
Confidentiality, Integrity and Availability
c.
CyberSpace, Integrity and Availability
d.
Confidentiality, Integrity and Security
Feedback
Your answer is correct.
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Is the process of maintaining an acceptable level of perceived risk
Security
Answer:
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Assurance that the information is authentic and complete.
Select one:
a.
Security
b.
Integrity
c.
Confidentiality
d.
Availability
Feedback
Your answer is correct.
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Availability: Availability of information refers to ensuring that authorized parties are able to
access the information when needed
Select one:
True
False