
Quiz 2 Need for Security / Information Security Legal and Ethical Issues
Quiz by Glenda Delizo
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Items of fact collected by an organization. It includes raw numbers, facts, and words. Student quiz scores is a simple example.
Users enter free textType an Answer30s - Q2
Data that has been organized, structured, and presented to provide additional insight into its context, worth, and usefulness. For example, a student’s class average can be presented in the context of its value, as in “90 ¼ A.”
Users enter free textType an Answer30s - Q3
The focus of information security; information that has value to the organization, and the systems that store, process, and transmit the information.
Data Asset
Information Security Asset
Information Asset
30s - Q4
As a subset of information assets, the systems and networks that store, process, and transmit information.
Network
Media
Data
30s - Q5
Commonly used as a surrogate for information security, data security is the focus of protecting data or information in its various states—at rest (in storage), in processing, and in transmission (over networks).
data security
media security
information security
30s - Q6
A collection of related data stored in a structured form and usually managed by a database management system.
Users enter free textType an Answer30s - Q7
A subset of information security that focuses on the assessment and protection of information stored in data repositories like database management systems and storage media.
information security
database security
data security
30s - Q8
An intentional or unintentional act that can damage or otherwise compromise information and the systems that support it.
Users enter free textType an Answer30s - Q9
Attacks can be active or passive and direct or indirect.
truefalseTrue or False30s - Q10
A technique used to compromise a system.
exploit
vulnerability
threat
30s - Q11
A potential weakness in an asset or its defensive control system(s).
threat
attack
vulnerability
30s - Q12
The creation, ownership, and control of original ideas as well as the representation of those ideas.
Intellectual Property
Copyright
Trademark
30s - Q13
The unauthorized duplication, installation, or distribution of copyrighted computer software, which is a violation of intellectual property.
Software Intellectual Property
Software Property
Software piracy
30s - Q14
An interruption in service, usually from a service provider, which causes an adverse event within an organization.
availability interruption
availability loss
availability disruption
30s - Q15
The percentage of time a particular service is not available;
low time
downtime
undertime
30s