INFORMATION SECURITY REVIEWER

The practice of protecting information by mitigating information risks is called Information Assurance.
True
False
The practice of protecting information by mitigating information risks.
Information Assurance
Information Cybersecurity
Securing Data
Information Security
Information ASSURANCE has four (4) objectives ?
True
False
What are the (4) objectives of Information Assurance (IAAC)?
Integrity, Resilience, Confidentiality, Authentication
Integrity, Authentication, Availability, Confidentiality
Integrity, Ability, Authentication, Confidentiality
Integrity, Authentication, Availability, Capability
Information Security (IAAC) has five (5) objectives
True
False
The THREE (3) OBJECTIVES OF INFORMATION SECURITY (IAAC)
Confidentiality, Integrity, Availability
Quality, Integrity, Availability
Authentication, Integrity, Availability
Confidentiality, Quality, Assurance
One of the objectives of Information Security, where information is not disclosed to individuals that are unauthorized, other entities and process.
Confidentiality
Data Privacy
The era where Password protection was created
1960's
1970's
1980's
1990's
Cybersecurity’s history began with a research project during the 1970s, on what was then known as the ARPANET (The Advanced Research Projects Agency Network)
True
False
An experimental computer program written at BBN in 1971
IDE
Creeper
Reaper
CreepyPasta
Who wrote the creeper?
Steve Jobs
Bob Thomas
Ray Tomlinson
Marcus Hess
The man who invented email and created another program called REAPER, providing the FIRST ANTIVIRUS SOFTWARE
Jack Tomlinson
Ray Tomilinson
Norman Tomlinson
Jay Tomlinson
The year where computer viruses became more advance
1980's
1990's
The German Computer Hacker that was hired by the Russians to steal US military Secrets
Marcus Hess
Mark Zeus
Mark Heuss
Marky Huss
In 1998, network usage began to expand rapidly, and more and more became connected to it. The security measures required had gradually become more expansive as well, which gave birth to?
Confidentiality
Anti-Virus Systems
Morris Worm
Firewalls
In the 1990's, _______ was modelled based on the physical structures that prevent the spread of actual fires within buildings or structures.
Mozilla Firefox
Firewall
Morris Worm
The year onwards where governments began to give MUCH MORE SERIOUS SENTENCES TOWARDS CRIMINALITY REGARDING HACKING.
1990's
2000's
The era of major breaches happened somewhere on the 2010's
True
False
A former CIA employee and contractor for the US Government – copied and leaked classified information from the National Security Agency (NSA), highlighting the fact that the government was effectively ‘spying’ on the public.
Eden Snow
Edward Huss
Edward Snowden
Jeopardizing the accounts and personal information of all their three billion users. Which company were fined $35 million for failing to disclose news of the breach in a timely manner?
Google
Yahoo
More widely known as the first ‘ransomworm’. This ransomworm targeted computers running the Microsoft Windows operating system and demanded ransom payments in the Bitcoin cryptocurrency
WannaFun
WannaCry
WannaTears
WannaSlip
Higher position in information security who is in charge of strategies and policies
Security Awareness Training Specialist
Security Operation Center
Chief Information Security Officer
Security Compliance Officer
Security Architects
Security Analyst/Engineer
Monitors and analyzes, in charge of security audits
Security Awareness Training Specialist
Security Operation Center
Chief Information Security Officer
Security Compliance Officer
Security Architects
Security Analyst/Engineer
 
Designs and Implements security structure. They collaborate with other ITs for implementation (testing server/ production implementation)
Security Awareness Training Specialist
Security Operation Center
Chief Information Security Officer
Security Compliance Officer
Security Architects
Security Analyst/Engineer
 
They monitor security events and incidents real-time
Security Awareness Training Specialist
Security Operation Center
Chief Information Security Officer
Security Compliance Officer
Security Architects
Security Analyst/Engineer
 
Ensures the organization complies about the issues
Security Awareness Training Specialist
Security Operation Center
Chief Information Security Officer
Security Compliance Officer
Security Architects
Security Analyst/Engineer
 
Educates the person involve in the incidents
Security Awareness Training Specialist
Security Operation Center
Chief Information Security Officer
Security Compliance Officer
Security Architects
Security Analyst/Engineer
 
{"name":"INFORMATION SECURITY REVIEWER", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"The practice of protecting information by mitigating information risks is called Information Assurance., The practice of protecting information by mitigating information risks., Information ASSURANCE has four (4) objectives ?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Make your own Survey
- it's free to start.