placeholder image to represent content

Information Security Management

Quiz by Anuj Nepal

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1

    What does C.I.A triangle stand for in standard for computer security ?

    Confidentiality, Internal and Above

    Confidentiality, Integrity and Authority

    Confidentiality, Integrity and Availability

    Confidentiality, Intention and Availability

    15s
  • Q2

    What are the 6 Principles of Information Security Management?

    Planning, policy, programs, protection, people, projects

    Planning, policy, partition, protection, people, projects

    Planning, prevention, programs, protection, people, projects

    Planning, prevention, partition, protection, people, projects

    20s
  • Q3

    What are Risk control strategies?

    Defence, Transferal, Apply, Acceptance, Test

    Defence, Transferal, Mitigation, Acceptance, Termination 

    Defence, Movement, Mitigation, Acceptance, Test

    Defence, Transferal, Apply, Acceptance, Termination 

    20s
  • Q4

    What are Access Control Processes?

    Visualisation, Authentication, Author, Accountability 

    Identification, Calculation, Authorization, Accountability 

    Identification, Authentication, Authorization, Team meeting

    Identification, Authentication, Authorization, Accountability 

    20s
  • Q5

    What is Least privilege in Access Control Principles?

    maximum amount of info at minimal time to perform task

    tasks split up so more than one person is responsible for completion

    only info to specific info needed for task

    minimum amount of info at minimal time to perform task

    15s
  • Q6

    Which is not a type of  Infosec Policy?

    System-Specific Security Policy(SysSP)

    Issue-Specific security policy (ISSP)

    Certified Cloud Security Professional (CISSP)

    Enterprise Information security policy (ESIP) 

    15s
  • Q7

    What does SETA stand for?

    Security Engaging, Training and Awareness

    Security Engraving Total Application

    Security Education, Trap and Away

    Security Education, Training and Awareness

    15s
  • Q8

    What is not regarded as a Planning level?

    Audit

    Operational

    Tactical

    Strategic

    15s
  • Q9

    What is not the part of Graham-Denning access control model?

    A set of subjects

    A set of privilege

    A set of objects

    A set of rights

    15s
  • Q10

    ISO 27000 series includes a standard for the performance of risk management: ISO 27005. Which of the following is not included in a five-stage risk management methodology?

    Risk monitoring and review

    Risk mitigation

    Risk acceptance

    Risk treatment

    Risk assessment

    Risk communication

    15s

Teachers give this quiz to your class