Professional Documents
Culture Documents
1
Complete
Mark 1.00 out of 1.00
Flag question
Question text
In information security, data integrity means maintaining and assuring the accuracy and
consistency of data over its entire life-cycle.
Select one:
True
False
Question 2
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Assurance that information is shared only among authorized persons or organizations.
Select one:
a.
Security
b.
Confidentiality
c.
Availability
d.
Integrity
Question 3
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Cyberspace is "the environment in which communication over computer networks
occurs.“
Select one:
True
False
Question 4
Complete
Mark 3.00 out of 3.00
Flag question
Question text
Three Features of Security
Select one:
a.
Confidentiality, Integrity and Security
b.
Confidentiality, Integrity and Availability
c.
Confidentiality, System and Availability
d.
CyberSpace, Integrity and Availability
Question 5
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is roughly equivalent to privacy
Select one:
a.
Integrity
b.
Confidentiality
c.
Security
d.
Availability
Question 6
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Availability: Availability of information refers to ensuring that authorized parties are able
to access the information when needed
Select one:
True
False
Question 7
Complete
Mark 5.00 out of 5.00
Flag question
Question text
Six Concept of CyberCrime
Select one:
a.
Digital Underground, Virus, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet
b.
System, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and
Stuxnet
c.
Digital Underground, Underground Economy, System, Hacktivism, Cyberwar:Estonia Case
and Stuxnet
d.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia
Case and Stuxnet
Question 8
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Cyber security, also referred to as information technology security, focuses on protecting
computers, networks, programs and data from unintended or unauthorized access,
change or destruction.
Select one:
True
False
Question 9
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Cybersecurity is the collection of tools, policies, security concepts, security safeguards,
guidelines, risk management approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment and organization and
user’s assets.
Select one:
True
False
Question 10
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is a process, not an end state
security
Answer:
Question 11
Complete
Mark 0.00 out of 1.00
Flag question
Question text
Assurance that the information is authentic and complete.
Select one:
a.
Integrity
b.
Availability
c.
Confidentiality
d.
Security
Question 12
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Availability:Assurance that the systems responsible for delivering, storing and processing
information are accessible when needed, by those who need them.
Select one:
True
False
Question 13
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is the process of maintaining an acceptable level of perceived risk
security
Answer:
Question 14
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Concept of Cybercrime
Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it may be
the target.
Select one:
True
False