Explore the essentials of safeguarding information assets with this quiz. Assess your understanding of availability, confidentiality, integrity, mitigation strategies, and recovery plans. Ideal for learners aiming to enhance their knowledge in information security practices.
project manager
Crisis manager
Incident manager
Champion
Rate this question:
Wiretap Act
Pen/Trap Statute
Fourth amendment to the U.S. Constitution
Electronic Communication Protection Act
Rate this question:
Follow-on incidents
Blue bag operations
Black bag operations
War games
Rate this question:
Availability
Risk assessment
Integrity
Confidentiality
Rate this question:
Confidentiality
Risk assessment
Availability
Integrity
Rate this question:
Mitigation
Acceptance
Transference
Avoidance
Rate this question:
Business impact analysis (BIA)
Business continuity analysis (BCA)
Incident response analysis (IRA)
Threat analysis
Rate this question:
Integrity
Availability
Confidentiality
Risk assessment
Rate this question:
Contingency plan
Security plan
Threat plan
Social plan
Rate this question:
C.I.A. triangle
Asset classification
Strategic plan
Disaster recovery plan
Rate this question:
Acceptance
Avoidance
Mitigation
Inheritance
Rate this question:
Trespass
Polymorphism
Denial-of-service
Theft
Rate this question:
Threat
Intellectual property
Payload
Trojan horse
Rate this question:
Policy
Residual risk
Assessment
Business continuity plan
Rate this question:
Defense
Mitigation
Transference
Acceptance
Rate this question:
Strategic planning
Contingency planning
Enterprise information planning
Security planning
Rate this question:
DoS
Spyware
Trojan horse
Social engineering
Rate this question:
Incident
Trespass
Trojan horse
Risk
Rate this question:
Risk assessment
Mitigation plan
Risk management
Disaster recovery plan
Rate this question:
Avoidance
BC
DR
Risk assessment
Rate this question:
Programmers
Social engineers
Script kiddies
Cyberterrorists
Rate this question:
Disaster recovery plan
Risk assessment plan
Business continuity plan
Incident response plan
Rate this question:
Transference
Avoidance
Acceptance
Mitigation
Rate this question:
Organizational management and professionals
Information security management and professionals
Information technology management and professionals
Human resource management and professional
Rate this question:
Mission/business processes
Information assets
Contingency planning
Insurance costs
Rate this question:
Data management session
Forensic analysis
Facilitated data-gathering session
System log session
Rate this question:
Workload shift
Business disruption experience
Work-around procedure
Work outflow
Rate this question:
Downtime metrics
Mission
Information assets
Budget
Rate this question:
Departmental reports
System logs
Scheduled reports
Financial reports
Rate this question:
Human resource planning
Information security planning
Contingency planning
Relocation planning
Rate this question:
Champion
Crisis manager
Project manager
Incident manager
Rate this question:
Human resource management and professional
Information security management and professionals
Organizational management and professionals
Information technology management and professionals
Rate this question:
Community of interest
Incident response community
Network community
Database community
Rate this question:
Recovery criticality budgeting
Crisis management budgeting
Incident response budgeting
Risk assessment budgeting
Rate this question:
Contingency planning policy
Incident response policy
Disaster recovery policy
Cross-training policy
Rate this question:
Forensic analysis
Threat of attack analysis
Cross-training analysis
Business impact analysis
Rate this question:
Dependency objective
Training objective
Recovery time objective
Recovery point objective
Rate this question:
Prioritizing mission/business processes
Identifying recovery priorities
Budgeting for contingency operations
BIA data collection
Rate this question:
Human resource managers
Information security managers
Business managers
Physical plant managers
Rate this question:
Redundant equipment
Local area networks
Audit documentation
BIA questionnaires
Rate this question:
Dependency objective
Recovery point objective
Recovery time objective
Training objective
Rate this question:
Production schedule
Collaboration diagram
Focus group
IT application log
Rate this question:
Cloud storage sites
Electronic vaulting sites
Data archives
Data backups
Rate this question:
Continuous database protections
RAID Level 1+0 applications
Online backup applications
Legacy backup applications
Rate this question:
Virtual machine
Host platform
Hypervisor
Virtual hardware
Rate this question:
Continuous database protection
Legacy backup
RAID
Virtualization
Rate this question:
Differential
RAID
Disk-to-disk-to-cloud
Disk-to-disk-to-tape
Rate this question:
Nondisclosure agreement
Covenant not to compete
Intellectual property assurance
Statement of indemnification
Rate this question:
Quiz Review Timeline (Updated): Mar 22, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.