Mid Term Exam in Information Assurance and Security
Quiz by Brianne M. Singson
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
A detailed strategy that outlines how a company will continue to operate during and after an unexpected event or disaster.
Users re-arrange answers into correct orderJumble60s - Q2
This plan should detail the steps required to recover lost data, systems, and infrastructure.
Users re-arrange answers into correct orderJumble60s - Q3
Outlines how to communicate with employees, customers, and other stakeholders in the event of a disaster.
Resource Constraints
Communication Plan
Testing and Training
60s - Q4
The following are some benefits of a disaster recovery plan EXCEPT:
Meeting Compliance Requirements
Minimizing downtime
Mitigate financial risk
60s - Q5
It is an information access model that operates on a set of subjects, objects, and rights.
Brewer-Nash Security Model
Graham-Denning Model
Bell-LaPadula
60s - Q6
This model illustrates the direction of data flow between objects.
Brewer-Nash Security Model
Information flow model
Graham-Denning Model
60s - Q7
One of the five functional requirements which provide management of data in physical memory space (e.g., CPU registers, cache, main memory (RAM), disk storage (secondary storage))
Security Organization
Physical Organization
Logical Organization
60s - Q8
Managing the process operations by work/execution threads (a series of tasks) using the same programmed instructions. Which allows multiple users and service requests e.g. Mach Kernel (BSD UNIX: Solaris, MacOS X, etc.)
Users re-arrange answers into correct orderJumble60s - Q9
___________ is a function of memory management where a computer will store and retrieve data from a device's secondary storage to the primary storage.
Users re-arrange answers into correct orderJumble60s - Q10
_____________________ is the practice of regulating and managing who can access what, when, and under what conditions in a computer system or network
Users re-arrange answers into correct orderJumble60s - Q11
Describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm.
Users re-arrange answers into correct orderJumble60s - Q12
Attacks that can cause a safe area to break into or the invasion of a restricted area part. An attacker can easily damage or steal critical IT assets, install malware on systems, or leave a remote access port on the network.
PHISHING ATTACK
CYBER ATTACK
PHYSICAL ATTACK
60s - Q13
It contains burglar alarms, guards, and CCTV that keeps a complete record of the entire movement.
Users re-arrange answers into correct orderJumble60s - Q14
It controls and records the movement of people and vehicles.
Access Controls
Alarm Systems
Security Gates
30s - Q15
Good indoor and outdoor lighting may be sufficient to prevent unauthorized access, especially at night. ______________ LIGHTING
Users re-arrange answers into correct orderJumble60s