Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
100% found this document useful (1 vote)
131 views

Module 2 Multiple Choice Questions

This document contains 17 multiple choice questions that assess knowledge of key information technology and cybersecurity concepts. The questions cover topics such as information security and its goals of protecting information through confidentiality, integrity and availability. Additional topics include necessary security tools like policies, awareness and training; vulnerabilities and threats that can facilitate unauthorized access; and the three types of security controls - administrative, technical and physical.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
131 views

Module 2 Multiple Choice Questions

This document contains 17 multiple choice questions that assess knowledge of key information technology and cybersecurity concepts. The questions cover topics such as information security and its goals of protecting information through confidentiality, integrity and availability. Additional topics include necessary security tools like policies, awareness and training; vulnerabilities and threats that can facilitate unauthorized access; and the three types of security controls - administrative, technical and physical.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Multiple-choice questions for Module 2: IT and Cyber

1. Information security is about protecting information from unauthorized:


a) access
b) use
c) modification
d) all of the above
2. “A process of defining the security controls in order to protect the information assets”. This is
the definition of:
a) Information management
b) Information security management
c) Information security management protocol
d) Information technology management
3. The C.I.A. triangle includes:
a) Confidentiality
b) Intrusion
c) Confidentiality, intrusion and attacks
d) None of the above
4. Among the necessary tools for information security are:
a) Awareness
b) Training
c) Policy
d) All of the above
5. Among the most necessary tools for information security is:
a) Interconnectedness
b) Education
c) Communication
d) All of the above
6. Among the tools with little to no significance to information security is:
a) Policy
b) Education
c) Awareness
d) None of the above
7. Among the things that can facilitate unauthorized access to a computer by attackers are:
a) Software
b) Hardware
c) Procedural weakness of a safeguard
d) All of the above
8. The absence or weakness of a safeguard that could be exploited is called:
a) Threat
b) Vulnerability
c) Attack
d) Possibility
9. A threat is:
a) The potential danger to information or systems
b) A possibility that someone identifies a vulnerability
c) All of the above
d) None of the above
10. The entity that takes advantage of vulnerability is referred to as:
a) threat agent
b) vulnerability agent
c) risk agent
d) attacking agent
11. “The likelihood of a threat agent taking advantage of vulnerability and the corresponding
business impact” is called:
a) Vulnerability
b) Threat
c) Risk
d) Loss
12. In the context of information security, a synonym of risk would be:
a) Threat
b) Hacking
c) Security breach
d) None of the above
13. A cybersecurity safeguard could be:
a) Application
b) Software
c) All of the above
d) None of the above
14. The three types of security control are:
a) Administrative, bureaucratic and technical controls
b) Bureaucratic, policy and physical controls
c) Bureaucratic, logical and physical controls
d) Administrative, technical and physical controls
15. Physical controls, among other things, include:
a) Protecting the perimeter of the facility
b) Controlling individual access into the facility and different departments
c) All of the above
d) None of the above
16. The responsibilities for information security are divided between the following three groups:
a) Senior management, security officers, administrative staff
b) Senior management, functional management, operational management
c) Functional management, security management, administrative staff
d) Functional and operational managers and their staff
17. An information security project team would include:
a) System administrator but not a data custodian
b) Data custodian but not a system administrator or an end user
c) Risk assessment specialists but not security policy developers
d) Data custodian, system administrators, security policy developers

You might also like