Q2 Information Assurance and Security 1
Q2 Information Assurance and Security 1
Q2 20/20
Flag question
Question text
Raw facts with a known coding system
data
Answer:
Question 2
Correct
Mark 1.00 out of 1.00
Flag question
Question text
It should be: accurate, timely, complete, verifiable, consistent, available.
Select one:
a.
Data
b.
Information
c.
Knowledge
d.
Noise
Feedback
Your answer is correct.
Question 3
Correct
Mark 4.00 out of 4.00
Flag question
Question text
Four Security Domain
Select one:
a.
Physical Security, Personnel Security, IT Security and Operational Security
b.
Physical Security, Virus, IT Security and Operational Security
c.
System, Personnel Security, IT Security and Operational Security
d.
Physical Security, Personnel Security, IT Security and Security
Feedback
Your answer is correct.
Question 4
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Actions taken that protect and defend information and information systems by ensuring their
availability, integrity, authentication, confidentiality and non-repudiation
Select one:
True
False
Question 5
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Is data endowed with relevance and purpose.
Select one:
a.
Data
b.
Knowledge
c.
Information
d.
Noise
Feedback
Your answer is correct.
Question 6
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Information Assurance (IA) is the study of how to protect your information assets from
destruction, degradation, manipulation and exploitation.
Select one:
True
False
Question 7
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Processed data
information
Answer:
Question 8
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Timely, reliable access to data and information services for authorized users;
availability
Answer:
Question 9
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Raw facts with an unknown coding system
noise
Answer:
Question 10
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Assurance that information is not disclosed to unauthorized persons
Confidentiality
Answer:
Question 11
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Security measures to establish the validity of a transmission, message, or originator.
authentication
Answer:
Question 12
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Protection against unauthorized modification or destruction of information
integrity
Answer:
Question 13
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Information and data manipulation abilities in cyberspace;
Select one:
a.
Noise
b.
Information Infrastructure
c.
Physical Security
d.
IT Security
Feedback
Your answer is correct.
Question 14
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Data and data processing activities in physical space;
Select one:
a.
IT Security
b.
Personnel Security
c.
Physical
d.
Physical Security
Feedback
Your answer is correct.
Question 15
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Assurance that the sender is provided with proof of a data delivery and recipient is provided
with proof of the sender’s identity, so that neither can later deny having processed the data.
non-repudiation
Answer:
Question 16
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Accepted facts, principles, or rules of thumb that are useful for specific domains.
knowledge
Answer:
Question 17
Correct
Mark 1.00 out of 1.00
Flag question
Question text
Converting data into information thus requires knowledge
Select one:
a.
Data
b.
Information
c.
Noise
d.
Knowledge
Feedback
Your answer is correct.