Play this informative quiz on Information Security to see how well you know the topic. Information security is used to describe the procedures and devices created and used to safeguard confidential company data against change, interruption, destruction, and examination. Solutions and use cases for security. The quiz contains various questions ranging from easy, medium, to hard levels that will enhance See moreyour understanding of the topic. The quiz will also help you with last-minute revision before the exam. If you like this quiz, share it with your friends.
People
Practices
Processes
Principles
Rate this question:
Availability
Integrity
Confidentiality
Accountability
Rate this question:
Detective
Preventative
Compensating
Corrective
Rate this question:
Accountability
Authorization
Audit
I&A
Rate this question:
Corrective
Physical
Administrative
Technical
Rate this question:
True
False
Rate this question:
MAC
DAC
RBAC
ACL
Rate this question:
Rule-based
Role-based
Time-based
Content-dependent
Rate this question:
True
False
Rate this question:
Something you have
Something you do
Something you are
Something you know
Rate this question:
A token
A PIN
Biometrics
Strong/two-factor authentication
Rate this question:
It can allow an unauthenticated user access to all systems.
It can allow hackers through the firewall.
It can allow an unauthenticated user access to secure facilities.
If you forget your user ID and password, you will not have access to any systems.
Rate this question:
Centralized
Hybrid
Decentralized
RADIUS
Rate this question:
Break into a building.
Social engineering.
Capture a user ID and steal a password.
Guess a password through a brute force process.
Rate this question:
Spoofing.
Shoulder surfing.
Theft.
Guessing.
Rate this question:
True
False
Rate this question:
Vulnerability
Network scanning
Enumeration
Reconnaissance
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
It acts as a physical barrier to the TCB.
It determines access to objects by subjects.
It separates the trusted and untrusted parts of a computer system.
It implements the RM in an operating system.
Rate this question:
It eliminates the risk of security infringements.
It manages the security of computer components.
It creates a series of layers that impede penetration attempts.
Rate this question:
Operating systems
Firmware
Appliances
Application programs
Rate this question:
Operating system
Application program
Rate this question:
Threading
Multitasking
Multithreading
Rate this question:
True
False
Rate this question:
Microcontroller
CPU
Spyware
Firmware
Rate this question:
BLP
Lattice
Biba
Clark-Wilson
Rate this question:
Harrison-Ruzzo-Ullman
Graham-Denning
Non-Interference
Information Flow
Brewer-Nash
Rate this question:
Trusted recovery
Untrusted recovery
Rate this question:
DoD
TCSEC
TDI
TNI
Rate this question:
Confidentiality
Integrity
Availability
Obscurity
Rate this question:
Data service model
TCP/IP model
OSI model
Data network model
Rate this question:
Layer 7: Application
Layer 3: Physical
Layer 6: Presentation
Layer 2: Data Link
Layer 5: Session
Rate this question:
TCP/IP model
OSI model
ISO model
IPX/SPX
Rate this question:
CAN
WAN
MAN
LAN
Rate this question:
UDP
TCP
IP
DNS
Rate this question:
True
False
Rate this question:
Dial-up
Ethernet
Wireless
VPN
Rate this question:
Supporting automatic configuration using the associated LCP
Encapsulating PPP packets for remote delivery over the Internet to the target network
Identifying the beginning and end of an IP datagram
Securing wireless transmissions over the 802.11 networks
Rate this question:
True
False
Rate this question:
Spam
DoS
Worm
Trojan horse
Rate this question:
Spam
DoS
Worm
Trojan horse
Rate this question:
TLS
S-SSL
HTTPS
S-HTTP
Rate this question:
Firewall
ACL
IPS
IDS
Rate this question:
TACACS
RADIUS
Diameter
Circumference
Rate this question:
Firewall
ACL
IPS
Intrusion protection system
Rate this question:
Remote journaling
Electronic vaulting
Incremental backup
Differential backup
Rate this question:
Disks
A local LAN
Servers
Circuits
Rate this question:
Quiz Review Timeline (Updated): Nov 10, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.