0 of 15 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
1. The principle of integrity ensures that only the people who have permission or authority to view content can do so.
2. Integrity means making information secure at all times. So, it should be reliable, correct, and complete.
3. Availability means keeping networks and systems up and running.
4. Application security focuses on building and hosting secure applications in cloud environments.
5. Vulnerability management is a set of procedures and tools that you can use to identify, investigate, and respond to threats or damaging events.
6. Disaster recovery is scanning an environment for flaws and ranking remedies based on risk.
7. An ISP is a set of rules, policies and procedures designed to ensure all end users and networks within an organization meet minimum IT security and data protection security requirements.
8. An information security policy helps organizations define procedures for identifying and mitigating vulnerabilities and risks.
9. The principle of integrity ensures that only the people who have permission or authority to view content can do so.
10. Confidentiality, integrity, and availability are the main objectives of information security.
11. An access control policy can help outline the level of authority over data and IT systems for every level of your organization.
12. Public class is a piece of information that can be freely distributed.
13. Only transfer data via secure protocols. Encrypt any information copied to portable devices or transmitted across a public network. It belongs to data backup.
14. Security awareness training is a key element in ISP.
15. ISPs should address all data, programs, systems, facilities, infrastructure, authorized users, third parties, and fourth parties of an organization.