Professional Documents
Culture Documents
Security MCQ Sample
Security MCQ Sample
Which Security layer is used to protect items such as laptops, servers, and Pcs which involves the use of
guards, lockable rooms and CCTV cameras is known as?
*a. Physical
b. Personal
c. Object
d. Standard
*a. Authenticity
b. Spoofing
c. Confidence
d. Authorization
11. An object, person, or other entity that represents a constant danger to an asset
*a. Threat
b. Vulnerability
c. Exploit
d. Information Security
1. a/(an) _____ is existence of a weakness that can lead to undesirable event compromising
the system.
*a. Vulnerability
b. exploit
c. threat
d. subject
2. An individual who removes an application’s software protection that is designed to
prevent unauthorized duplication and time limit.
a. Phreaker
*b. Cracker
c. spoofing
d. Sniffer
Type: E
6. A successful organization should have multiple layers of security in place. List Six layers of
security that should be implemented to secure the information system. (3 Marks)
a. Physical security
b. Personal security
c. Operations security
d. Communications security
e. Network security
f. Information security
7. List three main criterion to identify asset with 1-1 example. (3 Marks)
People:
a. Name, position, ID, supervisor, security clearance, etc.
Procedures:
b. Description, purpose, storage location, etc.
Data:
c. Classification, own/creator/manager, size, structure, location, backup, etc.
____ plans usually include all preparations for the recovery process, strategies to limit losses
during the disaster, and detailed steps to follow when the smoke clears, the dust settles, or the
oodwaters recede.
Incident Response
*Disaster Recovery
Business Continuity
Business Response