Infomation Assurance Prelim Exam

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 17

Started on Wednesday, 7 April 2021, 11:09 AM

State Finished
Completed on Wednesday, 7 April 2021, 11:22 AM
Time taken 12 mins 58 secs
Grade 50.00 out of 50.00 (100%)
Question 1
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Timely, reliable access to data and information  services for authorized users;

availability
Answer: 

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text
It should be:  accurate, timely, complete, verifiable, consistent,  available.

Select one:

a.
Information

b.
Noise

c.
Knowledge

d.
Data

Question 3
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Actions taken that protect and defend information and  information systems by ensuring their availability,  integrity,
authentication, confidentiality and non-repudiation

Select one:

True

False

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Raw facts with a known coding system

data
Answer: 

Question 5
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is roughly equivalent to privacy

Select one:

a.
Security

b.
Confidentiality

c.
Integrity

d.
Availability

Question 6
Complete
Mark 3.00 out of 3.00

Flag question

Question text
Three distinct levels:

Select one or more:

a.
Perceptual

b.
Conceptual

c.
Desired Effects

d.
Physical

e.
Frameworks

Question 7
Complete
Mark 4.00 out of 4.00

Flag question

Question text
Type of Concept for Cybercrime

Select one:

a.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet

b.
Digital Underground, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and System

c.
Digital Underground, Efficient Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet

d.
Program, Underground Economy, Phishing, Hacktivism, Cyberwar:Estonia Case and Stuxnet

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that the sender is provided with proof  of a data delivery and recipient is provided with proof  of the sender’s
identity, so that neither can later deny  having processed the data.

Non-repudiation
Answer: 

Question 9
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Raw facts with an unknown coding system

noise
Answer: 

Question 10
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Cyberspace is "the environment in which communication over computer networks occurs.“

Select one:
True

False

Question 11
Complete
Mark 3.00 out of 3.00

Flag question

Question text
Three Features of Security

Select one:

a.
Efficient, Integrity and Availability

b.
Confidentiality, Integrity and Availability

c.
No Feelings, Integrity and Availability

d.
Confidentiality, Integrity and Flexible

Question 12
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Information security technical measures  such as:        encryption and key management, intrusion  detection, anti-virus
software, auditing, redundancy,  firewalls, policies and standards.

Defender's Operations
Answer: 

Question 13
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Information Assurance (IA) is the study of how to protect your  information assets from destruction, degradation,
manipulation and  exploitation.   

Select one:

True

False

Question 14
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Processed data

information
Answer: 

Question 15
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Involves the implementation of standard  operational security procedures that define the nature and  frequency of the
interaction between users, systems, and system  resources, the purpose of which is to.

Operational Security
Answer: 

Question 16
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs
and data from unintended or unauthorized access, change or destruction.

Select one:

True

False

Question 17
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is the inherent technical features and functions that  collectively contribute to an IT infrastructure achieving and  sustaining
confidentiality, integrity, availability, accountability, authenticity, and reliability.”

IT Security
Answer: 

Question 18
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is a variety of ongoing measures taken to  reduce the likelihood and severity of accidental and intentional  alteration,
destruction, misappropriation, misuse, misconfiguration,  unauthorized distribution, and unavailability of an organization’s 
logical and physical assets, as the result of action or inaction by  insiders and known outsiders, such as business partners.”
Select one:

a.
Personnel Security

b.
Operational Security

c.
Physical Security

d.
IT Security

Question 19
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Information and data manipulation abilities in cyberspace;

Select one:

a.
IT Security

b.
Information Infrastructure

c.
Physical Security

d.
Noise

Question 20
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management
approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment
and organization and user’s assets.

Select one:

True

False

Question 21
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Converting data into  information thus  requires knowledge

Select one:

a.
Noise

b.
Information

c.
Data

d.
Knowledge

Question 22
Complete
Mark 1.00 out of 1.00

Flag question

Question text
In information security, data integrity means maintaining and assuring the accuracy and consistency of data over its entire
life-cycle.

Select one:

True

False
Question 23
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Physical attack and destruction, including:  electromagnetic attack, visual spying, intrusion,  scavenging and removal,
wiretapping, interference,  and eavesdropping.

Select one:

a.
Information

b.
Data

c.
Desired Effects

d.
Attacker's Operations

Question 24
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Data and data processing activities in physical space;

Select one:

a.
Personnel Security

b.
Physical Security

c.
IT Security
d.
Physical

Question 25
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that information is shared only among authorized persons or organizations.

Select one:

a.
Integrity

b.
Security

c.
Availability

d.
Confidentiality

Question 26
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Concept of Cybercrime

Cyber Crime Computer crime, or cybercrime, is any crime that involves a computer and a network. The computer may have
been used in the commission of a crime, or it may be the target.

Select one:

True
False

Question 27
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Protection against unauthorized modification or  destruction of information

integrity
Answer: 

Question 28
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Consists of employees, former employees and  contractors.

insiders
Answer: 

Question 29
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Accepted facts, principles, or rules of thumb that are  useful  for specific domains.

know ledge
Answer: 

Question 30
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is the study of how to protect your  information assets from destruction, degradation, manipulation and  exploitation.

Select one:

a.
Efficient 

b.
Information Assurance

c.
Integrity

d.
Confidentiality

Question 31
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is a process, not an end state

security
Answer: 

Question 32
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is data  endowed with relevance  and purpose.
Select one:

a.
Data

b.
Noise

c.
Information

d.
Knowledge

Question 33
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Is the process of maintaining an acceptable level of perceived risk   

security
Answer: 

Question 34
Complete
Mark 1.00 out of 1.00

Flag question

Question text
 Availability:Assurance that the systems responsible for delivering, storing and processing information are accessible when
needed, by those who need them.

Select one:

True

False

Question 35
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Security measures to establish the validity of a  transmission, message, or originator.

Authentication
Answer: 

Question 36
Complete
Mark 1.00 out of 1.00

Flag question

Question text
To affect the technical performance and the  capability of physical systems, to disrupt the  capabilities of the defender.

Select one:

a.
Desired Effects

b.
Perceptual

c.
Attacker's Operations

d.
Noise

Question 37
Complete
Mark 1.00 out of 1.00

Flag question
Question text
Refers to the protection of hardware, software,  and data against physical threats to reduce or prevent disruptions  to
operations and services and loss of assets.”

Select one:

a.
IT Security

b.
Operational Security

c.
Personnel Security

d.
Physical Security

Question 38
Complete
Mark 4.00 out of 4.00

Flag question

Question text
Four Security Domains

Select one or more:

a.
Operational Security

b.
Personnel Security

c.
Physical Security

d.
Web Security

e.
IT Security

f.
Data Security
Question 39
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that the information is authentic and complete.

Select one:

a.
Security

b.
Confidentiality

c.
Integrity

d.
Availability

Question 40
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Availability: Availability of information refers to ensuring that authorized parties are able to access the information when
needed

Select one:

True

False

You might also like