
Quiz 1 IT 323 - Information Assurance and Security
Quiz by Glenda Delizo
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
A well-informed sense of assurance that the information risks and controls are in balance
Information System
Information Safety
Information Security
30s - Q2
Information security began later following development first mainframes
falsetrueTrue or False30s - Q3
In the 1960s the scope of computer security grew from physical security to safety of data, limiting unauthorized access to data and involvement of personnel from multiple levels of an organization
falsetrueTrue or False30s - Q4
What does MULTICS mean?
Multiplex Information and Computer Service
Multiplexed Information and Computing Security
Multiplexed Information and Computing Service
30s - Q5
The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information
System
Safety
Security
30s - Q6
What are the components of an Information System?
Software, Hardware, Data, People, Procedures, Network
Software, Hardware, Information, People, Procedures, Network,
Software, Hardware, Data, People, System, Network
30s - Q7
In balancing information security and access, it is possible to obtain perfect security
falsetrueTrue or False30s - Q8
C.I.A. triad. The industry standard for computer security since the development of the mainframe. What does C.I.A stand for?
Confidentiality, Intensity, Availability
Confidentiality, Integrity, Accuracy
Confidentiality, Integrity, Availability
30s - Q9
It is the protection of all communications media, technology, and content.
Network Security
Communications security
Information and Communication Security
30s - Q10
It is the protection of voice and data networking components, connections, and content.
Communication and Network security
Network security
Information and Network security
30s - Q11
A hacker attempting to break into an information system is an intentional attack.
truefalseTrue or False30s - Q12
Someone who casually reads sensitive information not intended for his or her use is committing an active attack
falsetrueTrue or False30s - Q13
An indirect attack is perpetrated by a hacker using a PC to break into a system.
falsetrueTrue or False30s - Q14
A direct attack is a hacker compromising a system and using it to attack other systems—for example, as part of a botnet (slang for robot network).
falsetrueTrue or False30s - Q15
A lightning strike that causes a building fire is an intentional attack.
falsetrueTrue or False30s