30 Questions
Which of the following refers to a type of network wherein access is restricted to a group of computers with common workgroup and/or usually in a geographical proximity?
local area network
Which principle involves incorporating privacy and security considerations into the design of systems and applications?
Privacy by design
Which term refers to the accuracy and consistency of data over its lifecycle?
Data integrity
Which type of attack involves perpetrators disguising a communication from an unknown source as coming from a known or trusted source?
spoofing
Which term refers to the features of computer systems that contain additional functionalities to avoid system interruption?
fault tolerance
Which of the following addresses the threats, vulnerabilities, and countermeasures that can be utilized to physically protect an enterprise's resources and sensitive information?
physical security
Which of the following can be a consequence of inadequate information security?
Financial losses and reputational damage
A measure in which developers design systems features which must prevent unauthorized access, alteration, theft, or physical damage to the organization's information resources is known as:
access control
A mechanism used to configure one computer with more than one network interface and multiple IP addresses as shown in its network directories to provide enhanced and reliable Internet connectivity without compromising efficient performance is known as:
multihoming
How does information assurance contribute to regulatory compliance?
By adhering to data protection laws and industry standards
What can be a consequence of a data breach in the healthcare sector?
Compromised patient privacy and legal consequences
Active and synchronous duplicating of all processes and transactions of server on backup servers to prevent any interruption in service is known as:
mirroring
What is the process of finding and fixing errors in program code called?
Debugging
What term refers to unauthorized access and misuse of sensitive information?
Data breach
How can smart cards enhance security by storing user passwords?
Both B and C
Why is information assurance important for businesses?
It protects critical data and maintains trust
What term describes faults in system design that could disrupt an organization's operations?
Risks
Why is employee training important for information security?
It empowers individuals to recognize and prevent security threats
Which of the following is NOT a primary goal of information security?
Maximizing data transmission speed
What is a firewall?
A combination of hardware and software that prevents unauthorized network access
What is non-repudiation in information security?
The prevention of users from denying the validity of their actions or data
Why might regularly changing passwords be a concern for end users?
It increases the workload for end users
If a user forgets their password, what is the recommended action?
Request the password to be resent via registered email
What is a potential consequence of not properly updating security software?
Increased risk of data breaches
What is the better way to deal with a forgotten password, according to the text?
Request password reset from admin who will then provide a temporary password
What is the primary purpose of password hashing?
To irreversibly convert passwords into a fixed-length string of characters
What is the purpose of the re-type password feature in data registration entries?
Checks users of their password entries via match-up with the first password
Why would requiring the regular changing of passwords be an area of concern for database administrators?
Additional workload for database administrators
Which password is the strongest against brute force attacks, according to the text?
Passw0rdKoToh
What is the purpose of password hints, according to the text?
Helps users remember their passwords
This quiz explores the best practices for handling forgotten passwords. Test your knowledge on requesting password resets, providing temporary passwords, and utilizing system registered email addresses or SMS for password recovery. Learn about the primary purpose of password hashing as well.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free