You are on page 1of 7

Question 

1
Complete
Mark 1.00 out of 1.00

Flag question

Question text
In information security, data integrity means maintaining and assuring the accuracy and
consistency of data over its entire life-cycle.

Select one:
True
False

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that information is shared only among authorized persons or organizations.

Select one:
a.
Security

b.
Confidentiality

c.
Availability

d.
Integrity

Question 3
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Cyberspace is "the environment in which communication over computer networks
occurs.“

Select one:
True
False

Question 4
Complete
Mark 3.00 out of 3.00

Flag question

Question text
Three Features of Security

Select one:
a.
Confidentiality, Integrity and Security

b.
Confidentiality, Integrity and Availability

c.
Confidentiality, System and Availability

d.
CyberSpace, Integrity and Availability

Question 5
Complete
Mark 1.00 out of 1.00

Flag question
Question text
Is roughly equivalent to privacy

Select one:
a.
Integrity

b.
Confidentiality

c.
Security

d.
Availability

Question 6
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Availability: Availability of information refers to ensuring that authorized parties are able
to access the information when needed

Select one:
True
False

Question 7
Complete
Mark 5.00 out of 5.00

Flag question

Question text
Six Concept of CyberCrime

Select one:
a.
Digital Underground, Virus, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet

b.
System, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and
Stuxnet

c.
Digital Underground, Underground Economy, System, Hacktivism, Cyberwar:Estonia Case
and Stuxnet

d.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia
Case and Stuxnet

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Cyber security, also referred to as information technology security, focuses on protecting
computers, networks, programs and data from unintended or unauthorized access,
change or destruction.

Select one:
True
False

Question 9
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Cybersecurity is the collection of tools, policies, security concepts, security safeguards,
guidelines, risk management approaches, actions, training, best practices, assurance and
technologies that can be used to protect the cyber environment and organization and
user’s assets.

Select one:
True
False

Question 10
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is a process, not an end state
security
Answer: 

Question 11
Complete
Mark 0.00 out of 1.00

Flag question

Question text
Assurance that the information is authentic and complete.

Select one:
a.
Integrity

b.
Availability

c.
Confidentiality

d.
Security
Question 12
Complete
Mark 1.00 out of 1.00

Flag question

Question text
 Availability:Assurance that the systems responsible for delivering, storing and processing
information are accessible when needed, by those who need them.

Select one:
True
False

Question 13
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is the process of maintaining an acceptable level of perceived risk   
security
Answer: 

Question 14
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Concept of Cybercrime
Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a
network. The computer may have been used in the commission of a crime, or it may be
the target.
Select one:
True
False

You might also like