placeholder image to represent content

Quiz 1 IT 323 - Information Assurance and Security

Quiz by Glenda Delizo

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
40 questions
Show answers
  • Q1

    A well-informed sense of assurance that  the information risks and controls are in balance

    Information System

    Information Safety

    Information Security

    30s
  • Q2

    Information security began later following development first mainframes

    false
    true
    True or False
    30s
  • Q3

    In the 1960s the scope of computer security grew from physical security to  safety of data, limiting unauthorized access to data and involvement of personnel from multiple levels of an organization

    false
    true
    True or False
    30s
  • Q4

    What does MULTICS mean? 

    Multiplex Information and Computer Service 

    Multiplexed Information and Computing Security

    Multiplexed Information and Computing Service 

    30s
  • Q5

    The protection of information and its critical elements,  including systems and hardware that use, store, and transmit that information

    System

    Safety

    Security

    30s
  • Q6

    What are the components of an Information System?

    Software, Hardware, Data, People, Procedures, Network

    Software, Hardware, Information, People, Procedures, Network,

    Software, Hardware, Data, People, System, Network

    30s
  • Q7

    In balancing information security and access, it is possible to obtain perfect security

    false
    true
    True or False
    30s
  • Q8

    C.I.A. triad. The industry standard for computer security since the development of the mainframe. What does C.I.A stand for?

    Confidentiality, Intensity, Availability

    Confidentiality, Integrity, Accuracy

    Confidentiality, Integrity, Availability

    30s
  • Q9

    It is the protection of all communications media, technology, and content.

    Network Security

    Communications security

    Information and Communication Security

    30s
  • Q10

    It is the protection of voice and data networking components, connections, and content.

    Communication and Network security

    Network security

    Information and Network security

    30s
  • Q11

    A hacker attempting to break into an information system is an intentional attack.

    true
    false
    True or False
    30s
  • Q12

    Someone who casually reads sensitive information not intended for his or her use is committing an active attack

    false
    true
    True or False
    30s
  • Q13

    An indirect attack is perpetrated by a hacker using a PC to break into a system.

    false
    true
    True or False
    30s
  • Q14

    A direct attack is a hacker compromising a system and using it to attack other systems—for example, as part of a botnet (slang for robot network).

    false
    true
    True or False
    30s
  • Q15

    A lightning strike that causes a building fire is an intentional attack.

    false
    true
    True or False
    30s

Teachers give this quiz to your class