0% found this document useful (0 votes)
5 views

IT Privacy

The document contains a quiz on IT Privacy and Security, covering various topics such as network performance, information security management, risk assessment, and data availability. It includes questions about encryption techniques, password policies, and risk management processes. The quiz assesses knowledge on key concepts essential for maintaining IT security and privacy.

Uploaded by

justuselessguy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

IT Privacy

The document contains a quiz on IT Privacy and Security, covering various topics such as network performance, information security management, risk assessment, and data availability. It includes questions about encryption techniques, password policies, and risk management processes. The quiz assesses knowledge on key concepts essential for maintaining IT security and privacy.

Uploaded by

justuselessguy
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

4.4 IT Privacy and Security - https://learn.jainuniversity.ac.in/student_t... https://learn.jainuniversity.ac.in/student_take_quiz_assignment/start/40...

Home

4.4 IT Privacy and Security


Continuous Assessment - 1

End of quiz
You are at the end; press Finished to complete and grade the quiz.
You can review your answers below and click Edit if you want to change any.

Finished

Question 1
The response time and transit time is used to measure the which type parameter of a network?

Response: Performance

Question 2
The database that allows a system administrator to associate a function with the relation is called:

Response: virtual private database

Question 3

1 of 5 16-07-2023, 10:14 pm
4.4 IT Privacy and Security - https://learn.jainuniversity.ac.in/student_t... https://learn.jainuniversity.ac.in/student_take_quiz_assignment/start/40...

The most important responsibility of an information security manager in an organization is:

Response: Recommending and monitoring security policies

Question 4
Quantitative techniques used to solve business problems are called:

Response: Operations research

Question 5
What is the one common way to maintain data availability?

Response: Data backup

Question 6
Information should be accurate, timely, complete, and

Response: Concise

Question 7
Main objective of risk assessment:

Response: To evaluate hazard and minimize risk

Question 8
In the computer networks, the encryption techniques are primarily used for improving what parameter?

Response: Security

Question 9
Acceptable risk is usually:

Response: Subjectively determined

Question 10
Two forms of risk assessments are:

Response: Qualitative and quantitative

Question 11

2 of 5 16-07-2023, 10:14 pm
4.4 IT Privacy and Security - https://learn.jainuniversity.ac.in/student_t... https://learn.jainuniversity.ac.in/student_take_quiz_assignment/start/40...

IT Privacy and Security

Response: Vulenerabilty

Question 12
To performs data conversion and subordination, and application communication and messaging services what is
EAI software provides:

Response: middleware

Question 13
Which is the first point where the security enforcement is needed:

Response: administration

Question 14
To ensure that an organization’s password policy is effective, it must provide two key elements: difficult to
guess; and what is the next one?

Response: Must be changed periodically

Question 15
Which of the following is NOT a TLA for a popular integration style?

Response: EEE

Question 16
RE represents:

Response: Risk exposure

Question 17
One common way to maintain data availability is:

Response: Data backup

Question 18
Three objectives of information security:

Response: Confidentiality, integrity, and availability

3 of 5 16-07-2023, 10:14 pm
4.4 IT Privacy and Security - https://learn.jainuniversity.ac.in/student_t... https://learn.jainuniversity.ac.in/student_take_quiz_assignment/start/40...

Question 19
which of the following assessments similar to EIA:

Response: Both A & B

Question 20
Purpose of the “screening” step in EIA:

Response: To determine whether a full EIA needed

Question 21
What assess the risk and your plans for risk mitigation and revise these when you learn more about the risk?

Response: Risk monitoring

Question 22
In general how many key elements constitute the entire security structure?

Response: 3

Question 23
In system hacking, which of the following is the most crucial activity?

Response: Information gathering

Question 24
To accept the potential risk and continue operating or to implement controls to lower the risk to an acceptable
level is termed as:

Response: Risk assumption

Question 25
Applications that create queries dynamically can be considered as a risk source of:

Response: injection

Question 26
The violation of principle if the computer is no more accessible denotes:

4 of 5 16-07-2023, 10:14 pm
4.4 IT Privacy and Security - https://learn.jainuniversity.ac.in/student_t... https://learn.jainuniversity.ac.in/student_take_quiz_assignment/start/40...

Response: Availaibity

Question 27
Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

Response: They help understands security and its components better

Question 28
The information security technology is used for avoiding browser-based hacking is called as:

Response: Anti-malware in browsers

Question 29
Risk management encompasses three processes: risk assessment, risk mitigation, and what other element?

Response: Evaluation and assessment

Question 30
Lack of access control policy is :

Response: Vulnerability

5 of 5 16-07-2023, 10:14 pm

You might also like