Infomation Assurance Prelim Exam
Infomation Assurance Prelim Exam
Infomation Assurance Prelim Exam
State Finished
Completed on Wednesday, 7 April 2021, 11:22 AM
Time taken 12 mins 58 secs
Grade 50.00 out of 50.00 (100%)
Question 1
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Timely, reliable access to data and information services for authorized users;
availability
Answer:
Question 2
Complete
Mark 1.00 out of 1.00
Flag question
Question text
It should be: accurate, timely, complete, verifiable, consistent, available.
Select one:
a.
Information
b.
Noise
c.
Knowledge
d.
Data
Question 3
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Actions taken that protect and defend information and information systems by ensuring their availability, integrity,
authentication, confidentiality and non-repudiation
Select one:
True
False
Question 4
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Raw facts with a known coding system
data
Answer:
Question 5
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is roughly equivalent to privacy
Select one:
a.
Security
b.
Confidentiality
c.
Integrity
d.
Availability
Question 6
Complete
Mark 3.00 out of 3.00
Flag question
Question text
Three distinct levels:
a.
Perceptual
b.
Conceptual
c.
Desired Effects
d.
Physical
e.
Frameworks
Question 7
Complete
Mark 4.00 out of 4.00
Flag question
Question text
Type of Concept for Cybercrime
Select one:
a.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet
b.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and System
c.
Digital Underground, Efficient Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet
d.
Program, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet
Question 8
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender’s
identity, so that neither can later deny having processed the data.
Non-repudiation
Answer:
Question 9
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Raw facts with an unknown coding system
noise
Answer:
Question 10
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Cyberspace is "the environment in which communication over computer networks occurs.“
Select one:
True
False
Question 11
Complete
Mark 3.00 out of 3.00
Flag question
Question text
Three Features of Security
Select one:
a.
Efficient, Integrity and Availability
b.
Confidentiality, Integrity and Availability
c.
No Feelings, Integrity and Availability
d.
Confidentiality, Integrity and Flexible
Question 12
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Information security technical measures such as: encryption and key management, intrusion detection, anti-virus
software, auditing, redundancy, firewalls, policies and standards.
Defender's Operations
Answer:
Question 13
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Information Assurance (IA) is the study of how to protect your information assets from destruction, degradation,
manipulation and exploitation.
Select one:
True
False
Question 14
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Processed data
information
Answer:
Question 15
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Involves the implementation of standard operational security procedures that define the nature and frequency of the
interaction between users, systems, and system resources, the purpose of which is to.
Operational Security
Answer:
Question 16
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs
and data from unintended or unauthorized access, change or destruction.
Select one:
True
False
Question 17
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is the inherent technical features and functions that collectively contribute to an IT infrastructure achieving and sustaining
confidentiality, integrity, availability, accountability, authenticity, and reliability.”
IT Security
Answer:
Question 18
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is a variety of ongoing measures taken to reduce the likelihood and severity of accidental and intentional alteration,
destruction, misappropriation, misuse, misconfiguration, unauthorized distribution, and unavailability of an organization’s
logical and physical assets, as the result of action or inaction by insiders and known outsiders, such as business partners.”
Select one:
a.
Personnel Security
b.
Operational Security
c.
Physical Security
d.
IT Security
Question 19
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Information and data manipulation abilities in cyberspace;
Select one:
a.
IT Security
b.
Information Infrastructure
c.
Physical Security
d.
Noise
Question 20
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management
approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment
and organization and user’s assets.
Select one:
True
False
Question 21
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Converting data into information thus requires knowledge
Select one:
a.
Noise
b.
Information
c.
Data
d.
Knowledge
Question 22
Complete
Mark 1.00 out of 1.00
Flag question
Question text
In information security, data integrity means maintaining and assuring the accuracy and consistency of data over its entire
life-cycle.
Select one:
True
False
Question 23
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Physical attack and destruction, including: electromagnetic attack, visual spying, intrusion, scavenging and removal,
wiretapping, interference, and eavesdropping.
Select one:
a.
Information
b.
Data
c.
Desired Effects
d.
Attacker's Operations
Question 24
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Data and data processing activities in physical space;
Select one:
a.
Personnel Security
b.
Physical Security
c.
IT Security
d.
Physical
Question 25
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Assurance that information is shared only among authorized persons or organizations.
Select one:
a.
Integrity
b.
Security
c.
Availability
d.
Confidentiality
Question 26
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Concept of Cybercrime
Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have
been used in the commission of a crime, or it may be the target.
Select one:
True
False
Question 27
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Protection against unauthorized modification or destruction of information
integrity
Answer:
Question 28
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Consists of employees, former employees and contractors.
insiders
Answer:
Question 29
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Accepted facts, principles, or rules of thumb that are useful for specific domains.
know ledge
Answer:
Question 30
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is the study of how to protect your information assets from destruction, degradation, manipulation and exploitation.
Select one:
a.
Efficient
b.
Information Assurance
c.
Integrity
d.
Confidentiality
Question 31
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is a process, not an end state
security
Answer:
Question 32
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is data endowed with relevance and purpose.
Select one:
a.
Data
b.
Noise
c.
Information
d.
Knowledge
Question 33
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Is the process of maintaining an acceptable level of perceived risk
security
Answer:
Question 34
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Availability:Assurance that the systems responsible for delivering, storing and processing information are accessible when
needed, by those who need them.
Select one:
True
False
Question 35
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Security measures to establish the validity of a transmission, message, or originator.
Authentication
Answer:
Question 36
Complete
Mark 1.00 out of 1.00
Flag question
Question text
To affect the technical performance and the capability of physical systems, to disrupt the capabilities of the defender.
Select one:
a.
Desired Effects
b.
Perceptual
c.
Attacker's Operations
d.
Noise
Question 37
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Refers to the protection of hardware, software, and data against physical threats to reduce or prevent disruptions to
operations and services and loss of assets.”
Select one:
a.
IT Security
b.
Operational Security
c.
Personnel Security
d.
Physical Security
Question 38
Complete
Mark 4.00 out of 4.00
Flag question
Question text
Four Security Domains
a.
Operational Security
b.
Personnel Security
c.
Physical Security
d.
Web Security
e.
IT Security
f.
Data Security
Question 39
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Assurance that the information is authentic and complete.
Select one:
a.
Security
b.
Confidentiality
c.
Integrity
d.
Availability
Question 40
Complete
Mark 1.00 out of 1.00
Flag question
Question text
Availability: Availability of information refers to ensuring that authorized parties are able to access the information when
needed
Select one:
True
False