Information Assurance Security 2

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Question 

1
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Converting data into  information thus  requires knowledge

Select one:
a.
Data

b.
Information

c.
Noise

d.
Knowledge

Question 2
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Information Assurance (IA) is the study of how to protect your  information assets from
destruction, degradation, manipulation and  exploitation.   

Select one:
True
False

Question 3
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Assurance that the sender is provided with proof  of a data delivery and recipient is
provided with proof  of the sender’s identity, so that neither can later deny  having
processed the data.
non-repudiation
Answer: 

Question 4
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Assurance that information is not disclosed to  unauthorized persons
confidentiality
Answer: 

Question 5
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Processed data
information
Answer: 

Question 6
Complete
Mark 1.00 out of 1.00

Flag question
Question text
Is data  endowed with relevance  and purpose.

Select one:
a.
Knowledge

b.
Data

c.
Information

d.
Noise

Question 7
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Protection against unauthorized modification or  destruction of information
integrity
Answer: 

Question 8
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Accepted facts, principles, or rules of thumb that are  useful  for specific domains.
know ledge
Answer: 

Question 9
Complete
Mark 1.00 out of 1.00
Flag question

Question text
Data and data processing activities in physical space;

Select one:
a.
IT Security

b.
Personnel Security

c.
Physical Security

d.
Physical

Question 10
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Security measures to establish the validity of a  transmission, message, or originator.

authentication
Answer: 

Question 11
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Actions taken that protect and defend information and  information systems by ensuring
their availability,  integrity, authentication, confidentiality and non-repudiation

Select one:
True
False

Question 12
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Raw facts with a known coding system
data
Answer: 

Question 13
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Raw facts with an unknown coding system
noise
Answer: 

Question 14
Complete
Mark 4.00 out of 4.00

Flag question

Question text
Four Security Domain

Select one:
a.
Physical Security, Personnel Security, IT Security and Operational Security

b.
Physical Security, Virus, IT Security and Operational Security

c.
Physical Security, Personnel Security, IT Security and Security

d.
System, Personnel Security, IT Security and Operational Security

Question 15
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Timely, reliable access to data and information  services for authorized users;
availability
Answer: 

Question 16
Complete
Mark 1.00 out of 1.00

Flag question

Question text
Information and data manipulation abilities in cyberspace;

Select one:
a.
Noise

b.
IT Security

c.
Physical Security
d.
Information Infrastructure

Question 17
Complete
Mark 0.00 out of 1.00

Flag question

Question text
It should be:  accurate, timely, complete, verifiable, consistent,  available.

Select one:
a.
Knowledge

b.
Noise

c.
Data

d.
Information

You might also like