Quiz Summary
0 of 19 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 19 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 19
1. Question
Match this term with the definition: Confidentiality
CorrectIncorrect -
Question 2 of 19
2. Question
Match this term with the definition: Integrity
CorrectIncorrect -
Question 3 of 19
3. Question
Match this term with the definition: Availability
CorrectIncorrect -
Question 4 of 19
4. Question
Match this term with the definition: Non-repudiation
CorrectIncorrect -
Question 5 of 19
5. Question
Match this term with the definition: Gap Analysis
CorrectIncorrect -
Question 6 of 19
6. Question
Match this term with the definition: Accounting
CorrectIncorrect -
Question 7 of 19
7. Question
True or False: A secure web gateway blocking social networking sites is a physical security control.
CorrectIncorrect -
Question 8 of 19
8. Question
True or False: Motion-activated floodlighting is a physical control with detection and deterrence functions.
CorrectIncorrect -
Question 9 of 19
9. Question
True or False: Authorization verifies a user’s identity.
CorrectIncorrect -
Question 10 of 19
10. Question
True or False: DevSecOps aims to integrate security into the development and operations process.
CorrectIncorrect -
Question 11 of 19
11. Question
What term describes when a sender cannot deny sending a message?
CorrectIncorrect -
Question 12 of 19
12. Question
What type of control is a firewall that blocks unauthorized packets and updates ACLs?
CorrectIncorrect -
Question 13 of 19
13. Question
A security control enforced by a person and replicating another control’s function is:
CorrectIncorrect -
Question 14 of 19
14. Question
Which business unit manages complex security needs like intellectual property and customer data?
CorrectIncorrect -
Question 15 of 19
15. Question
What function does accounting serve in security?
CorrectIncorrect -
Question 16 of 19
16. Question
What are the three main properties of a secure information system?
CorrectIncorrect -
Question 17 of 19
17. Question
What process compares current practices to a framework to identify gaps?
CorrectIncorrect -
Question 18 of 19
18. Question
Which statement best describes the difference between authentication and authorization?
CorrectIncorrect -
Question 19 of 19
19. Question
Which cultural shift improves collaboration between IT and development teams while integrating security?
CorrectIncorrect