Play this informative quiz on Information Security to see how well you know the topic. Information security is used to describe the procedures and devices created and used to safeguard confidential company data against change, interruption, destruction, and examination. Solutions and use cases for security. The quiz contains various questions ranging from easy, medium, to hard levels that will enhance your understanding of the topic. The quiz will also help you with last-minute revision before the exam. If you like this quiz, share it with your friends.
True
False
Rate this question:
Spoofing.
Shoulder surfing.
Theft.
Guessing.
Rate this question:
CAN
WAN
MAN
LAN
Rate this question:
Trusted recovery
Untrusted recovery
Rate this question:
True
False
Rate this question:
Availability
Integrity
Confidentiality
Accountability
Rate this question:
True
False
Rate this question:
Operating system
Application program
Rate this question:
Accountability
Authorization
Audit
I&A
Rate this question:
Corrective
Physical
Administrative
Technical
Rate this question:
Spam
DoS
Worm
Trojan horse
Rate this question:
A token
A PIN
Biometrics
Strong/two-factor authentication
Rate this question:
It eliminates the risk of security infringements.
It manages the security of computer components.
It creates a series of layers that impede penetration attempts.
Rate this question:
Spam
DoS
Worm
Trojan horse
Rate this question:
Dial-up
Ethernet
Wireless
VPN
Rate this question:
True
False
Rate this question:
Layer 7: Application
Layer 3: Physical
Layer 6: Presentation
Layer 2: Data Link
Layer 5: Session
Rate this question:
Supporting automatic configuration using the associated LCP
Encapsulating PPP packets for remote delivery over the Internet to the target network
Identifying the beginning and end of an IP datagram
Securing wireless transmissions over the 802.11 networks
Rate this question:
Electronic vaulting
Incremental backup
Differential backup
Full backup
Rate this question:
It acts as a physical barrier to the TCB.
It determines access to objects by subjects.
It separates the trusted and untrusted parts of a computer system.
It implements the RM in an operating system.
Rate this question:
Threading
Multitasking
Multithreading
Rate this question:
DoD
TCSEC
TDI
TNI
Rate this question:
TCP/IP model
OSI model
ISO model
IPX/SPX
Rate this question:
MAC
DAC
RBAC
ACL
Rate this question:
It can allow an unauthenticated user access to all systems.
It can allow hackers through the firewall.
It can allow an unauthenticated user access to secure facilities.
If you forget your user ID and password, you will not have access to any systems.
Rate this question:
UDP
TCP
IP
DNS
Rate this question:
True
False
Rate this question:
TLS
S-SSL
HTTPS
S-HTTP
Rate this question:
Centralized
Hybrid
Decentralized
RADIUS
Rate this question:
Microcontroller
CPU
Spyware
Firmware
Rate this question:
True
False
Rate this question:
Break into a building.
Social engineering.
Capture a user ID and steal a password.
Guess a password through a brute force process.
Rate this question:
True
False
Rate this question:
Detective
Preventative
Compensating
Corrective
Rate this question:
Something you have
Something you do
Something you are
Something you know
Rate this question:
Rule-based
Role-based
Time-based
Content-dependent
Rate this question:
True
False
Rate this question:
Firewall
ACL
IPS
IDS
Rate this question:
Firewall
ACL
IPS
Intrusion protection system
Rate this question:
Vulnerability
Network scanning
Enumeration
Reconnaissance
Rate this question:
Remote journaling
Electronic vaulting
Incremental backup
Differential backup
Rate this question:
Data service model
TCP/IP model
OSI model
Data network model
Rate this question:
People
Practices
Processes
Principles
Rate this question:
Harrison-Ruzzo-Ullman
Graham-Denning
Non-Interference
Information Flow
Brewer-Nash
Rate this question:
Operating systems
Firmware
Appliances
Application programs
Rate this question:
Disks
A local LAN
Servers
Circuits
Rate this question:
TACACS
RADIUS
Diameter
Circumference
Rate this question:
Confidentiality
Integrity
Availability
Obscurity
Rate this question:
Quiz Review Timeline (Updated): Nov 10, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Information Security Awareness Training Quiz
Information security awareness is a relatively new and evolving part of information security which focus more on raising consciousness regarding potential risks of the rapidly...
Questions:
10 |
Attempts:
2878 |
Last updated:
Mar 22, 2023
|
Revision Topic 1: Introduction To Security
This quiz covers basic concepts of information security, including protection measures, threats, vulnerabilities, and relevant technologies.
Questions:
20 |
Attempts:
255 |
Last updated:
Mar 21, 2023
|
Information Asset Protection L1
This quiz focuses on the fundamentals of information asset protection, covering key components like information systems, software, tools, and data, aligned with effective security...
Questions:
35 |
Attempts:
60 |
Last updated:
Apr 19, 2023
|
The Ultimate Quiz On Information Assets
Explore the essentials of safeguarding information assets with this quiz. Assess your understanding of availability, confidentiality, integrity, mitigation strategies, and...
Questions:
238 |
Attempts:
219 |
Last updated:
Mar 22, 2023
|
Information Security Assessment Quiz! Trivia
What do you know about the information security assessment? Do you think you can pass this quiz? Information security is the method of safeguarding information by diminishing...
Questions:
15 |
Attempts:
466 |
Last updated:
Mar 21, 2023
|
Information Security Awareness Training
This Information Security Awareness Training quiz assesses key skills in identifying and mitigating security risks, such as tailgating and phishing. It emphasizes the importance...
Questions:
20 |
Attempts:
962 |
Last updated:
Mar 17, 2023
|
Wait!
Here's an interesting quiz for you.