ITSMA - L1  Introduction to ITSMA
10 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the ultimate objective of security?

  • To protect the sovereignty of a state
  • To protect assets, resources, and people
  • To protect from adversaries (correct)
  • To implement a multi-layered system

What are the six layers of security that a successful organization should have in place?

  • Physical, personal, operations, communications, network, and information security (correct)
  • Physical, financial, operations, communications, network, and information security
  • Physical, personal, operations, communications, human resources, and information security
  • Physical, personal, operations, communications, network, and reputation security

What is the purpose of auditing in information security?

  • To ensure confidentiality
  • To ensure integrity
  • To evaluate the effectiveness of the defense systems (correct)
  • To ensure availability

What is a cyber threat?

<p>An event or circumstance that has the potential to cause a negative/undesired outcome (B)</p> Signup and view all the answers

What are the three types of vulnerabilities?

<p>Known, business logic-related, and zero-day (C)</p> Signup and view all the answers

What are the two types of cyber risks?

<p>External and internal (D)</p> Signup and view all the answers

What is the goal of confidentiality in information security?

<p>To ensure that computer-related assets are accessed only by authorized parties (B)</p> Signup and view all the answers

What is a cyber risk in information security?

<p>The impact of a threat exploiting a vulnerability (D)</p> Signup and view all the answers

What is the goal of integrity in information security?

<p>To ensure that assets can be modified only by authorized parties or only in authorized ways (B)</p> Signup and view all the answers

What is the goal of availability in information security?

<p>To ensure that assets are accessible to authorized parties at appropriate times (C)</p> Signup and view all the answers

More Like This

Cyber Security Basics
3 questions

Cyber Security Basics

GratifyingCognition avatar
GratifyingCognition
Banking Security and Control Objectives
12 questions
Security Informatics Objectives
18 questions

Security Informatics Objectives

BrilliantDramaticIrony avatar
BrilliantDramaticIrony
Use Quizgecko on...
Browser
Browser