This document contains 8 questions about information security concepts from a chapter on security introductions. The questions cover topics like the three main goals of information security being confidentiality, integrity and availability; implementing nonrepudiation to prove who sent emails; the A in CIA standing for availability; removable storage posing the greatest risk to confidentiality of data; and examples of physical controls like ID cards. The questions are multiple choice and have answers ranging from letters A to D.
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Chapter 01 introduction to security
1. Questions & Answers
Chapter 1 - Introduction to Security
Prowse (2012)
8 Questions
Muhammad Jazman, S.Kom.,MInfoSys
jazman@uin-suska.ac.id
http://sif.uin-suska.ac.id/
2. Question 1
In information security, what are the three main
goals? (Select the three best answers.)
A. Auditing
B. Integrity
C. Nonrepudiation
D. Confidentiality
E. Risk Assessment
F. Availability
3. Question 2
To protect against malicious attacks, what
should you think like?
A. Hacker
B. Network admin
C. Spoofer
D. Auditor
4. Question 3
Tom sends out many e-mails containing secure
information to other companies. What concept
should be implemented to prove that Tom did
indeed send the e-mails?
A. Authenticity
B. Nonrepudiation
C. Confidentiality
D. Integrity
5. Question 4
Which of the following does the A in CIA stand
for when it comes to IT security?
Select the best answer.
A. Accountability
B. Assessment
C. Availability
D. Auditing
6. Question 5
Which of the following is the greatest risk when it
comes to removable storage?
A. Integrity of data
B. Availability of data
C. Confidentiality of data
D. Accountability of data
7. Question 6
When it comes to information security, what is
the I in CIA?
A. Insurrection
B. Information
C. Indigestion
D. Integrity
8. Question 7
You are developing a security plan for your
organization. Which of the following is an
example of a physical control?
A. Password
B. DRP
C. ID card
D. Encryption
9. Question 8
When is a system completely secure?
A. When it is updated
B. When it is assessed for vulnerabilities
C. When all anomalies have been removed
D. Never