placeholder image to represent content

Quiz 2 Need for Security / Information Security Legal and Ethical Issues

Quiz by Glenda Delizo

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
50 questions
Show answers
  • Q1

    Items of fact collected by an organization. It includes raw numbers, facts, and words. Student quiz scores is a simple example.

    Users enter free text
    Type an Answer
    30s
  • Q2

    Data that has been organized, structured, and presented to provide additional insight into its context, worth, and usefulness. For example, a student’s class average can be presented in the context of its value, as in “90 ¼ A.”

    Users enter free text
    Type an Answer
    30s
  • Q3

    The focus of information security; information that has value to the organization, and the systems that store, process, and transmit the information.

    Data Asset

    Information Security Asset

    Information Asset

    30s
  • Q4

    As a subset of information assets, the systems and networks that store, process, and transmit information.

    Network

    Media

    Data 

    30s
  • Q5

    Commonly used as a surrogate for information security, data security is the focus of protecting data or information in its various states—at rest (in storage), in processing, and in transmission (over networks).

    data security

    media security

    information security

    30s
  • Q6

    A collection of related data stored in a structured form and usually managed by a database management system.

    Users enter free text
    Type an Answer
    30s
  • Q7

    A subset of information security that focuses on the assessment and protection of information stored in data repositories like database management systems and storage media.

    information security

    database security

    data security

    30s
  • Q8

    An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.

    Users enter free text
    Type an Answer
    30s
  • Q9

    Attacks can be active or passive and direct or indirect.

    true
    false
    True or False
    30s
  • Q10

    A technique used to compromise a system.

    exploit

    vulnerability

    threat

    30s
  • Q11

    A potential weakness in an asset or its defensive control system(s).

    threat

    attack

    vulnerability

    30s
  • Q12

    The creation, ownership, and control of original ideas as well as the representation of those ideas.

    Intellectual Property

    Copyright

    Trademark

    30s
  • Q13

    The unauthorized duplication, installation, or distribution of copyrighted computer software, which is a violation of intellectual property.

    Software Intellectual Property

    Software Property

    Software piracy

    30s
  • Q14

    ​An interruption in service, usually from a service provider, which causes an adverse event within an organization.

    availability interruption

    availability loss

    availability disruption

    30s
  • Q15

    The percentage of time a particular service is not available;

    low time

    downtime

    undertime

    30s

Teachers give this quiz to your class