
Information Security Management
Quiz by Anuj Nepal
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
What does C.I.A triangle stand for in standard for computer security ?
Confidentiality, Internal and Above
Confidentiality, Integrity and Authority
Confidentiality, Integrity and Availability
Confidentiality, Intention and Availability
15s - Q2
What are the 6 Principles of Information Security Management?
Planning, policy, programs, protection, people, projects
Planning, policy, partition, protection, people, projects
Planning, prevention, programs, protection, people, projects
Planning, prevention, partition, protection, people, projects
20s - Q3
What are Risk control strategies?
Defence, Transferal, Apply, Acceptance, Test
Defence, Transferal, Mitigation, Acceptance, Termination
Defence, Movement, Mitigation, Acceptance, Test
Defence, Transferal, Apply, Acceptance, Termination
20s - Q4
What are Access Control Processes?
Visualisation, Authentication, Author, Accountability
Identification, Calculation, Authorization, Accountability
Identification, Authentication, Authorization, Team meeting
Identification, Authentication, Authorization, Accountability
20s - Q5
What is Least privilege in Access Control Principles?
maximum amount of info at minimal time to perform task
tasks split up so more than one person is responsible for completion
only info to specific info needed for task
minimum amount of info at minimal time to perform task
15s - Q6
Which is not a type of Infosec Policy?
System-Specific Security Policy(SysSP)
Issue-Specific security policy (ISSP)
Certified Cloud Security Professional (CISSP)
Enterprise Information security policy (ESIP)
15s - Q7
What does SETA stand for?
Security Engaging, Training and Awareness
Security Engraving Total Application
Security Education, Trap and Away
Security Education, Training and Awareness
15s - Q8
What is not regarded as a Planning level?
Audit
Operational
Tactical
Strategic
15s - Q9
What is not the part of Graham-Denning access control model?
A set of subjects
A set of privilege
A set of objects
A set of rights
15s - Q10
ISO 27000 series includes a standard for the performance of risk management: ISO 27005. Which of the following is not included in a five-stage risk management methodology?
Risk monitoring and review
Risk mitigation
Risk acceptance
Risk treatment
Risk assessment
Risk communication
15s