placeholder image to represent content

Mid Term Exam in Information Assurance and Security

Quiz by Brianne M. Singson

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
50 questions
Show answers
  • Q1

    A detailed strategy that outlines how a company will continue to operate during and after an unexpected event or disaster.

    Users re-arrange answers into correct order
    Jumble
    60s
  • Q2

    This plan should detail the steps required to recover lost data, systems, and infrastructure.

    Users re-arrange answers into correct order
    Jumble
    60s
  • Q3

    Outlines how to communicate with employees, customers, and other stakeholders in the event of a disaster.

    Resource Constraints

    Communication Plan

    Testing and Training

    60s
  • Q4

    The following are some benefits of a disaster recovery plan EXCEPT:

    Meeting Compliance Requirements

    Minimizing downtime

    Mitigate financial risk

    60s
  • Q5

    It is an information access model that operates on a set of subjects, objects, and rights.

    Brewer-Nash Security Model

    Graham-Denning Model

    Bell-LaPadula

    60s
  • Q6

    This model illustrates the direction of data flow between objects.

    Brewer-Nash Security Model

    Information flow model

    Graham-Denning Model

    60s
  • Q7

    One of the five functional requirements which provide management of data in physical memory space (e.g., CPU registers, cache, main memory (RAM), disk storage (secondary storage))

    Security Organization

    Physical Organization

    Logical Organization

    60s
  • Q8

    Managing the process operations by work/execution threads (a series of tasks) using the same programmed instructions. Which allows multiple users and service requests e.g. Mach Kernel (BSD UNIX: Solaris, MacOS X, etc.)

    Users re-arrange answers into correct order
    Jumble
    60s
  • Q9

    ___________ is a function of memory management where a computer will store and retrieve data from a device's secondary storage to the primary storage.

    Users re-arrange answers into correct order
    Jumble
    60s
  • Q10

    _____________________ is the practice of regulating and managing who can access what, when, and under what conditions in a computer system or network

    Users re-arrange answers into correct order
    Jumble
    60s
  • Q11

    Describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm.

    Users re-arrange answers into correct order
    Jumble
    60s
  • Q12

    Attacks that can cause a safe area to break into or the invasion of a restricted area part. An attacker can easily damage or steal critical IT assets, install malware on systems, or leave a remote access port on the network.

    PHISHING ATTACK

    CYBER ATTACK

    PHYSICAL ATTACK

    60s
  • Q13

    It contains burglar alarms, guards, and CCTV that keeps a complete record of the entire movement.

    Users re-arrange answers into correct order
    Jumble
    60s
  • Q14

    It controls and records the movement of people and vehicles.

    Access Controls

    Alarm Systems

    Security Gates

    30s
  • Q15

    Good indoor and outdoor lighting may be sufficient to prevent unauthorized access, especially at night. ______________ LIGHTING

    Users re-arrange answers into correct order
    Jumble
    60s

Teachers give this quiz to your class