The Ultimate Quiz On Information Assets

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By P_baus
P
P_baus
Community Contributor
Quizzes Created: 1 | Total Attempts: 212
Questions: 238 | Attempts: 212

SettingsSettingsSettings
Information Quizzes & Trivia

Questions and Answers
  • 1. 

    What is a common approach used in the discipline of systems analysis and design to understand the ways systems operate and to chart process flows and interdependency studies?

    • A.

      Systems diagramming

    • B.

      Network diagramming

    • C.

      Application diagramming

    • D.

      Database diagramming

    Correct Answer
    A. Systems diagramming
    Explanation
    Cap 2

    Rate this question:

  • 2. 

    In a CPMT, a(n) ____ should be a high-level manager with influence and resources that can be used to support the project team, promote the objectives of the CP project, and endorse the results that come from the combined effort.

    • A.

      project manager

    • B.

      Crisis manager

    • C.

      Incident manager

    • D.

      Champion

    Correct Answer
    D. Champion
    Explanation
    Cap 2

    Rate this question:

  • 3. 

    The ____ is a federal law that creates a general prohibition on the realtime monitoring of traffic data relating to communications.

    • A.

      Wiretap Act

    • B.

      Pen/Trap Statute

    • C.

      Fourth amendment to the U.S. Constitution

    • D.

      Electronic Communication Protection Act

    Correct Answer
    B. Pen/Trap Statute
    Explanation
    Cap 5

    Rate this question:

  • 4. 

    ____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up. 

    • A.

      Follow-on incidents

    • B.

      Blue bag operations

    • C.

      Black bag operations

    • D.

      War games

    Correct Answer
    A. Follow-on incidents
    Explanation
    Cap 9

    Rate this question:

  • 5. 

    Information assets have ____ when authorized users - persons or computer systems - are able to access them in the specified format without interference or obstruction.

    • A.

      Availability

    • B.

      Risk assessment

    • C.

      Integrity

    • D.

      Confidentiality

    Correct Answer
    A. Availability
    Explanation
    Cap 1

    Rate this question:

  • 6. 

    ____ ensures that only those with the rights and privileges to access information are able to do so.

    • A.

      Confidentiality

    • B.

      Risk assessment

    • C.

      Availability

    • D.

      Integrity

    Correct Answer
    A. Confidentiality
    Explanation
    Cap 1

    Rate this question:

  • 7. 

    ____ is the risk control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation.

    • A.

      Mitigation

    • B.

      Acceptance

    • C.

      Transference

    • D.

      Avoidance

    Correct Answer
    A. Mitigation
    Explanation
    Cap 1

    Rate this question:

  • 8. 

    A(n) ____ is an investigation and assessment of the impact that various attacks can have on the organizatio.

    • A.

      Business impact analysis (BIA)

    • B.

      Business continuity analysis (BCA)

    • C.

      Incident response analysis (IRA)

    • D.

      Threat analysis

    Correct Answer
    A. Business impact analysis (BIA)
    Explanation
    Cap 1

    Rate this question:

  • 9. 

    Information assets have ____ when they are not exposed (while being stored, processed, or transmitted) to corruption, damage, destruction, or other disruption of their authentic states.

    • A.

      Integrity

    • B.

      Availability

    • C.

      Confidentiality

    • D.

      Risk assessment

    Correct Answer
    A. Integrity
    Explanation
    Cap 1

    Rate this question:

  • 10. 

    A(n) ____ is used to anticipate, react to, and recover from events that threaten the security of information and information assets in an organization; it is also used to restore the organization to normal modes of business operations;

    • A.

      Contingency plan

    • B.

      Security plan

    • C.

      Threat plan

    • D.

      Social plan

    Correct Answer
    A. Contingency plan
    Explanation
    Cap 1

    Rate this question:

  • 11. 

    The ____ illustrates the most critical characteristics of information and has been the industry standard for computer security since the development of the mainframe.

    • A.

      C.I.A. triangle

    • B.

      Asset classification

    • C.

      Strategic plan

    • D.

      Disaster recovery plan

    Correct Answer
    A. C.I.A. triangle
    Explanation
    Cap 1

    Rate this question:

  • 12. 

    ____ of risk is the choice to do nothing to protect an information asset and to accept the outcome of its potential exploitation.

    • A.

      Acceptance

    • B.

      Avoidance

    • C.

      Mitigation

    • D.

      Inheritance

    Correct Answer
    A. Acceptance
    Explanation
    Cap 1

    Rate this question:

  • 13. 

    The term ____ refers to a broad category of electronic and human activities in which an unauthorized individual gains access to the information an organization is trying to protect.

    • A.

      Trespass

    • B.

      Polymorphism

    • C.

      Denial-of-service

    • D.

      Theft

    Correct Answer
    A. Trespass
    Explanation
    Cap 1

    Rate this question:

  • 14. 

    A(n) ____ is an object, person, or other entity that is a potential risk of loss to an asset.

    • A.

      Threat

    • B.

      Intellectual property

    • C.

      Payload

    • D.

      Trojan horse

    Correct Answer
    A. Threat
    Explanation
    Cap 1

    Rate this question:

  • 15. 

    A(n) ____ is a plan or course of action used by an organization to convey instructions from its senior management to those who make decisions, take actions, and perform other duties on behalf of the organization.

    • A.

      Policy

    • B.

      Residual risk

    • C.

      Assessment

    • D.

      Business continuity plan

    Correct Answer
    A. Policy
    Explanation
    Cap 1

    Rate this question:

  • 16. 

    ____ (sometimes referred to as avoidance) is the risk control strategy that attempts to prevent the exploitation of a vulnerability.

    • A.

      Defense

    • B.

      Mitigation

    • C.

      Transference

    • D.

      Acceptance

    Correct Answer
    A. Defense
    Explanation
    Cap 1

    Rate this question:

  • 17. 

    ____ is the process of moving an organization toward its vision.

    • A.

      Strategic planning

    • B.

      Contingency planning

    • C.

      Enterprise information planning

    • D.

      Security planning

    Correct Answer
    A. Strategic planning
    Explanation
    Cap 1

    Rate this question:

  • 18. 

    A(n) ____ attack&seeks$to*denyiilegitimate@users\access[to>services0byXeither tying up a server's available resources or causing it to shut down.

    • A.

      DoS

    • B.

      Spyware

    • C.

      Trojan horse

    • D.

      Social engineering

    Correct Answer
    A. DoS
    Explanation
    Cap 1

    Rate this question:

  • 19. 

    A(n) ____ is any clearly identified attack on the organization's information assets that would threaten the assets' confidentiality, integrity, or availability.

    • A.

      Incident

    • B.

      Trespass

    • C.

      Trojan horse

    • D.

      Risk

    Correct Answer
    A. Incident
    Explanation
    Cap 1

    Rate this question:

  • 20. 

    A ____ deals with the preparation for and recovery from a disaster, whether natural or man-made.

    • A.

      Risk assessment

    • B.

      Mitigation plan

    • C.

      Risk management

    • D.

      Disaster recovery plan

    Correct Answer
    D. Disaster recovery plan
    Explanation
    Cap 1

    Rate this question:

  • 21. 

    ____ assigns a risk rating or score to each information asset. Although this number does not mean anything in absolute terms, it is useful in gauging the relative risk to each vulnerable information asset and facilitates the development of comparative ratings later in the risk control process.

    • A.

      Avoidance

    • B.

      BC

    • C.

      DR

    • D.

      Risk assessment

    Correct Answer
    D. Risk assessment
    Explanation
    Cap 1

    Rate this question:

  • 22. 

    ____ hack systems to conduct terrorist activities through network or Internet pathways.

    • A.

      Programmers

    • B.

      Social engineers

    • C.

      Script kiddies

    • D.

      Cyberterrorists

    Correct Answer
    D. Cyberterrorists
    Explanation
    Cap 1

    Rate this question:

  • 23. 

    A ____ is a document that describes how, in the event of a disaster, critical business functions continue at an alternate location while the organization recovers its ability to function at the primary site.

    • A.

      Disaster recovery plan

    • B.

      Risk assessment plan

    • C.

      Business continuity plan

    • D.

      Incident response plan

    Correct Answer
    C. Business continuity plan
    Explanation
    Cap 1

    Rate this question:

  • 24. 

    ____ is a risk control approach that attempts to shift the risk to other assets, other processes, or other organizations.

    • A.

      Transference

    • B.

      Avoidance

    • C.

      Acceptance

    • D.

      Mitigation

    Correct Answer
    A. Transference
    Explanation
    Cap 1

    Rate this question:

  • 25. 

    The ____ job functions and organizational roles focus on protecting the organization's information systems and stored information from attacks.

    • A.

      Organizational management and professionals

    • B.

      Information security management and professionals

    • C.

      Information technology management and professionals

    • D.

      Human resource management and professional

    Correct Answer
    B. Information security management and professionals
    Explanation
    Cap 2

    Rate this question:

  • 26. 

    The last stage of a business impact analysis is prioritizing the resources associated with the ____, which brings a better understanding of what must be recovered first.

    • A.

      Mission/business processes

    • B.

      Information assets

    • C.

      Contingency planning

    • D.

      Insurance costs

    Correct Answer
    A. Mission/business processes
    Explanation
    Cap 2

    Rate this question:

  • 27. 

    The ____ is used to collect information directly from the end users and business managers.

    • A.

      Data management session

    • B.

      Forensic analysis

    • C.

      Facilitated data-gathering session

    • D.

      System log session

    Correct Answer
    C. Facilitated data-gathering session
    Explanation
    Cap 2

    Rate this question:

  • 28. 

    A manual alternative to the normal way of accomplishing an IT task might be employed in the event that IT is unavailable. This is called a ____.

    • A.

      Workload shift

    • B.

      Business disruption experience

    • C.

      Work-around procedure

    • D.

      Work outflow

    Correct Answer
    C. Work-around procedure
    Explanation
    Cap 2

    Rate this question:

  • 29. 

    The first major business impact analysis task is to analyze and prioritize the organization's business processes based on their relationships to the organization's ____.

    • A.

      Downtime metrics

    • B.

      Mission

    • C.

      Information assets

    • D.

      Budget

    Correct Answer
    B. Mission
    Explanation
    Cap 2

    Rate this question:

  • 30. 

    Which of the following collects and provides reports on failed login attempts, probes, scans, denial-of-service attacks, and detected malware?

    • A.

      Departmental reports

    • B.

      System logs

    • C.

      Scheduled reports

    • D.

      Financial reports

    Correct Answer
    B. System logs
    Explanation
    Cap 2

    Rate this question:

  • 31. 

    The elements required to begin the ____ process are a planning methodology; a policy environment to enable the planning process; an understanding of the causes and effects of core precursor activities, and access to financial and other resources.

    • A.

      Human resource planning

    • B.

      Information security planning

    • C.

      Contingency planning

    • D.

      Relocation planning

    Correct Answer
    C. Contingency planning
    Explanation
    Cap 2

    Rate this question:

  • 32. 

    In a CPMT, a(n) ____ leads the project to make sure a sound project planning process is used, a complete and useful project plan is developed, and project resources are prudently managed.

    • A.

      Champion

    • B.

      Crisis manager

    • C.

      Project manager

    • D.

      Incident manager

    Correct Answer
    C. Project manager
    Explanation
    Cap 2

    Rate this question:

  • 33. 

    The ____ job functions and organizational roles focus on costs of system creation and operation, ease of use for system users, timeliness of system creation, and transaction response time.

    • A.

      Human resource management and professional

    • B.

      Information security management and professionals

    • C.

      Organizational management and professionals

    • D.

      Information technology management and professionals

    Correct Answer
    D. Information technology management and professionals
    Explanation
    Cap 2

    Rate this question:

  • 34. 

    Within an organization, a(n) ____ is a group of individuals who are united by shared interests or values and who have a common goal of making the organization function to meet its objectives.

    • A.

      Community of interest

    • B.

      Incident response community

    • C.

      Network community

    • D.

      Database community

    Correct Answer
    A. Community of interest
    Explanation
    Cap 2

    Rate this question:

  • 35. 

    Companies may want to consider budgeting for contributions to employee loss expenses (such as funerals) as well as for counseling services for employees and loved ones as part of ____

    • A.

      Recovery criticality budgeting

    • B.

      Crisis management budgeting

    • C.

      Incident response budgeting

    • D.

      Risk assessment budgeting

    Correct Answer
    B. Crisis management budgeting
    Explanation
    Cap 2

    Rate this question:

  • 36. 

    The purpose of the ____ is to define the scope of the CP operations and establish managerial intent with regard to timetables for response to incidents, recovery from disasters, and  reestablishment of operations for continuity.

    • A.

      Contingency planning policy

    • B.

      Incident response policy

    • C.

      Disaster recovery policy

    • D.

      Cross-training policy

    Correct Answer
    A. Contingency planning policy
    Explanation
    Cap 2

    Rate this question:

  • 37. 

    The ____ is an investigation and assessment of the impact that various events or incidents can have on the organization.

    • A.

      Forensic analysis

    • B.

      Threat of attack analysis

    • C.

      Cross-training analysis

    • D.

      Business impact analysis

    Correct Answer
    D. Business impact analysis
    Explanation
    Cap 2

    Rate this question:

  • 38. 

    The ____ is the point in time, determined by the business unit, from which systems and data can be recovered after an outage.

    • A.

      Dependency objective

    • B.

      Training objective

    • C.

      Recovery time objective

    • D.

      Recovery point objective

    Correct Answer
    D. Recovery point objective
    Explanation
    Cap 2

    Rate this question:

  • 39. 

    The final component to the CPMT planning process is to deal with ____.

    • A.

      Prioritizing mission/business processes

    • B.

      Identifying recovery priorities

    • C.

      Budgeting for contingency operations

    • D.

      BIA data collection

    Correct Answer
    C. Budgeting for contingency operations
    Explanation
    Cap 2

    Rate this question:

  • 40. 

    A CPMT should include _____ who can oversee the security planning of the project and provide information on threats, vulnerabilities, and recovery requirements needed in the planning process.

    • A.

      Human resource managers

    • B.

      Information security managers

    • C.

      Business managers

    • D.

      Physical plant managers

    Correct Answer
    B. Information security managers
    Explanation
    Cap 2

    Rate this question:

  • 41. 

    To a large extent, incident response capabilities are part of a normal IT budget. The only area in which additional budgeting is absolutely required for incident response is the maintenance of  ____.

    • A.

      Redundant equipment

    • B.

      Local area networks

    • C.

      Audit documentation

    • D.

      BIA questionnaires

    Correct Answer
    A. Redundant equipment
    Explanation
    Cap 2

    Rate this question:

  • 42. 

    The ____ is the period of time within which systems, applications, or functions must be recovered after an outage.

    • A.

      Dependency objective

    • B.

      Recovery point objective

    • C.

      Recovery time objective

    • D.

      Training objective

    Correct Answer
    C. Recovery time objective
    Explanation
    Cap 2

    Rate this question:

  • 43. 

    One modeling technique drawn from systems analysis and design that can provide an excellent way to illustrate how a business functions is a(n) ____.

    • A.

      Production schedule

    • B.

      Collaboration diagram

    • C.

      Focus group

    • D.

      IT application log

    Correct Answer
    B. Collaboration diagram
    Explanation
    Cap 2

    Rate this question:

  • 44. 

    ____ are used for recovery from disasters that threaten on-site backups.

    • A.

      Cloud storage sites

    • B.

      Electronic vaulting sites

    • C.

      Data archives

    • D.

      Data backups

    Correct Answer
    C. Data archives
    Explanation
    Cap 3

    Rate this question:

  • 45. 

    Considered to be the traditional "lock and copy" approach to database backup, _____ require the database to be inaccessible while a backup is created to a local drive.

    • A.

      Continuous database protections

    • B.

      RAID Level 1+0 applications

    • C.

      Online backup applications

    • D.

      Legacy backup applications

    Correct Answer
    D. Legacy backup applications
    Explanation
    Cap 3

    Rate this question:

  • 46. 

    A ____ is a synonym for a virtualization application.

    • A.

      Virtual machine

    • B.

      Host platform

    • C.

      Hypervisor

    • D.

      Virtual hardware

    Correct Answer
    C. Hypervisor
    Explanation
    Cap 3

    Rate this question:

  • 47. 

    ____ uses a number of hard drives to store information across multiple drive units.

    • A.

      Continuous database protection

    • B.

      Legacy backup

    • C.

      RAID

    • D.

      Virtualization

    Correct Answer
    C. RAID
    Explanation
    Cap 3

    Rate this question:

  • 48. 

    An organization aggregates all local backups to a central repository and then backs up that repository to an online vendor, with a ____ backup strategy.

    • A.

      Differential

    • B.

      RAID

    • C.

      Disk-to-disk-to-cloud

    • D.

      Disk-to-disk-to-tape

    Correct Answer
    C. Disk-to-disk-to-cloud
    Explanation
    Cap 3

    Rate this question:

  • 49. 

    A(n) ____ is an agreement in which the client agrees not to use the vendor's services to compete directly with the vendor, and for the client not to use vendor information to gain a better deal with another vendor.

    • A.

      Nondisclosure agreement

    • B.

      Covenant not to compete

    • C.

      Intellectual property assurance

    • D.

      Statement of indemnification

    Correct Answer
    B. Covenant not to compete
    Explanation
    Cap 3

    Rate this question:

  • 50. 

    A(n) ____ is often included in legal documents to ensure that a vendor is not liable for actions taken by a client.

    • A.

      Covenant not to compete

    • B.

      Intellectual property assurance

    • C.

      Statement of indemnification

    • D.

      Nondisclosure agreement

    Correct Answer
    C. Statement of indemnification
    Explanation
    Cap 3

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 10, 2017
    Quiz Created by
    P_baus
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.