Quiz Summary
0 of 19 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 19 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Data Security 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 19
1. Question
Where do data security requirements come from?
CorrectIncorrect -
Question 2 of 19
2. Question
What is the definition of data security?
CorrectIncorrect -
Question 3 of 19
3. Question
Which of these options is NOT a step in identifying data that requires protection?
CorrectIncorrect -
Question 4 of 19
4. Question
One of the main approaches to managing sensitive data is classifying them and enforcing a common standard. This process is also part of:
CorrectIncorrect -
Question 5 of 19
5. Question
The 4 A’s are a common set of data security requirements. Which one of these is NOT part of the 4 A’s?
CorrectIncorrect -
Question 6 of 19
6. Question
When a word is being obfuscated into numbers that require a cipher to unlock, we call this:
CorrectIncorrect -
Question 7 of 19
7. Question
An area around the edge of an organisation with a firewall between it and the internet and/or between it and the organisation’s internal systems is known as?
CorrectIncorrect -
Question 8 of 19
8. Question
Which is NOT a good method to ensure credential security when users are accessing a system?
CorrectIncorrect -
Question 9 of 19
9. Question
Information that allows you to determine an individual is also known as:
CorrectIncorrect -
Question 10 of 19
10. Question
Complete this sentence: “In granting access to data, …”
CorrectIncorrect -
Question 11 of 19
11. Question
Which of these is NOT a potential source of Malware?
CorrectIncorrect -
Question 12 of 19
12. Question
How should organisations go about creating data security policies?
CorrectIncorrect -
Question 13 of 19
13. Question
Which of these methods to allocate access control privileges is most appropriate for a large organization?
CorrectIncorrect -
Question 14 of 19
14. Question
When implementing controls and procedures, which of these is NOT something to take into consideration?
CorrectIncorrect -
Question 15 of 19
15. Question
While the Information security team enforces and protects the network, which role is responsible for determining the right confidentiality levels?
CorrectIncorrect -
Question 16 of 19
16. Question
Which of these risks is present when there is a lack of automated authentication and access monitoring?
CorrectIncorrect -
Question 17 of 19
17. Question
All these steps help to manage regulatory compliance except:
CorrectIncorrect -
Question 18 of 19
18. Question
When trying to identify the level of security awareness in an organisation, which type of metric is the most suitable?
CorrectIncorrect -
Question 19 of 19
19. Question
Organisations are turning increasingly into cloud based computing environments. What are some measures needed to adapt to this new emergence?
CorrectIncorrect