ITSMA - L1  Introduction to ITSMA
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the ultimate objective of security?

  • To protect the sovereignty of a state
  • To protect assets, resources, and people
  • To protect from adversaries (correct)
  • To implement a multi-layered system

What are the six layers of security that a successful organization should have in place?

  • Physical, personal, operations, communications, network, and information security (correct)
  • Physical, financial, operations, communications, network, and information security
  • Physical, personal, operations, communications, human resources, and information security
  • Physical, personal, operations, communications, network, and reputation security

What is the purpose of auditing in information security?

  • To ensure confidentiality
  • To ensure integrity
  • To evaluate the effectiveness of the defense systems (correct)
  • To ensure availability

What is a cyber threat?

<p>An event or circumstance that has the potential to cause a negative/undesired outcome (B)</p> Signup and view all the answers

What are the three types of vulnerabilities?

<p>Known, business logic-related, and zero-day (C)</p> Signup and view all the answers

What are the two types of cyber risks?

<p>External and internal (D)</p> Signup and view all the answers

What is the goal of confidentiality in information security?

<p>To ensure that computer-related assets are accessed only by authorized parties (B)</p> Signup and view all the answers

What is a cyber risk in information security?

<p>The impact of a threat exploiting a vulnerability (D)</p> Signup and view all the answers

What is the goal of integrity in information security?

<p>To ensure that assets can be modified only by authorized parties or only in authorized ways (B)</p> Signup and view all the answers

What is the goal of availability in information security?

<p>To ensure that assets are accessible to authorized parties at appropriate times (C)</p> Signup and view all the answers

More Like This

Cyber Security Basics
3 questions

Cyber Security Basics

GratifyingCognition avatar
GratifyingCognition
Cyber Security Basics
10 questions

Cyber Security Basics

SplendidAmethyst avatar
SplendidAmethyst
Banking Security and Control Objectives
12 questions
Security Informatics Objectives
18 questions

Security Informatics Objectives

BrilliantDramaticIrony avatar
BrilliantDramaticIrony
Use Quizgecko on...
Browser
Browser