SlideShare a Scribd company logo
Questions & Answers
Chapter 1 - Introduction to Security
Prowse (2012)
8 Questions
Muhammad Jazman, S.Kom.,MInfoSys
jazman@uin-suska.ac.id
http://sif.uin-suska.ac.id/
Question 1
In information security, what are the three main
goals? (Select the three best answers.)
A. Auditing
B. Integrity
C. Nonrepudiation
D. Confidentiality
E. Risk Assessment
F. Availability
Question 2
To protect against malicious attacks, what
should you think like?
A. Hacker
B. Network admin
C. Spoofer
D. Auditor
Question 3
Tom sends out many e-mails containing secure
information to other companies. What concept
should be implemented to prove that Tom did
indeed send the e-mails?
A. Authenticity
B. Nonrepudiation
C. Confidentiality
D. Integrity
Question 4
Which of the following does the A in CIA stand
for when it comes to IT security?
Select the best answer.
A. Accountability
B. Assessment
C. Availability
D. Auditing
Question 5
Which of the following is the greatest risk when it
comes to removable storage?
A. Integrity of data
B. Availability of data
C. Confidentiality of data
D. Accountability of data
Question 6
When it comes to information security, what is
the I in CIA?
A. Insurrection
B. Information
C. Indigestion
D. Integrity
Question 7
You are developing a security plan for your
organization. Which of the following is an
example of a physical control?
A. Password
B. DRP
C. ID card
D. Encryption
Question 8
When is a system completely secure?
A. When it is updated
B. When it is assessed for vulnerabilities
C. When all anomalies have been removed
D. Never

More Related Content

Similar to Chapter 01 introduction to security (20)

PPTX
Assessment with few question Grade 9 A & C.pptx
dejen6
 
PDF
E Commerce 2017 14th Edition Laudon Test Bank
enmyseegum
 
PDF
E Commerce 2017 14th Edition Laudon Test Bank
htezehn238
 
PPTX
4_5769479639445540375.pptx
HHoko1
 
PDF
E Commerce 2017 14th Edition Laudon Test Bank
szelcchauxmd
 
DOCX
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
justine1simpson78276
 
PPT
Intro to Cyber Security Final in the field of CS
PrasunMaity3
 
PPT
Module 1 :Introduction to Cyber Security
JunYin38
 
PPT
Module1_Intro to Security and cyber challenges_Final.ppt
AfricanChild3
 
PPT
Module1_Intro to Security_Final.ppt
AshaPagidipalli
 
PPT
Module1_Intro to Security_Final.ppt
zenotechae
 
PPT
Module1_Intro to Security_Finallllllll.ppt
TRIOSTECHNOLOGIES2
 
PPT
CyberSecurity - Linda Sharp
SchoolDude Editors
 
DOCX
Answer each question in one to two paragraphs.Question 1
brockdebroah
 
DOCX
Unit I Q&A.docx
karthikaparthasarath
 
PPT
Module1_Intro to Security_Final.psfsdfsdpt
teamtriccatech
 
PPT
Module1_Intro to Security_Final.pptsssss
teamtriccatech
 
PPT
Module1_Intro to Security_Final.ppt power point
Madeena Saifullah
 
PPT
Cyber Security For Computer Science & Engineering.ppt
RupakKumar67
 
PPT
cryptography and nwtwork security concepts.ppt
anithapodishetty1234
 
Assessment with few question Grade 9 A & C.pptx
dejen6
 
E Commerce 2017 14th Edition Laudon Test Bank
enmyseegum
 
E Commerce 2017 14th Edition Laudon Test Bank
htezehn238
 
4_5769479639445540375.pptx
HHoko1
 
E Commerce 2017 14th Edition Laudon Test Bank
szelcchauxmd
 
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
justine1simpson78276
 
Intro to Cyber Security Final in the field of CS
PrasunMaity3
 
Module 1 :Introduction to Cyber Security
JunYin38
 
Module1_Intro to Security and cyber challenges_Final.ppt
AfricanChild3
 
Module1_Intro to Security_Final.ppt
AshaPagidipalli
 
Module1_Intro to Security_Final.ppt
zenotechae
 
Module1_Intro to Security_Finallllllll.ppt
TRIOSTECHNOLOGIES2
 
CyberSecurity - Linda Sharp
SchoolDude Editors
 
Answer each question in one to two paragraphs.Question 1
brockdebroah
 
Unit I Q&A.docx
karthikaparthasarath
 
Module1_Intro to Security_Final.psfsdfsdpt
teamtriccatech
 
Module1_Intro to Security_Final.pptsssss
teamtriccatech
 
Module1_Intro to Security_Final.ppt power point
Madeena Saifullah
 
Cyber Security For Computer Science & Engineering.ppt
RupakKumar67
 
cryptography and nwtwork security concepts.ppt
anithapodishetty1234
 

More from Muhammad Jazman (10)

DOCX
Fundamental concepts of future city
Muhammad Jazman
 
PDF
Pohl & van genderen 2017p5 figure 1.2 electromagnetic spectrum with wavelengt...
Muhammad Jazman
 
DOCX
Pohl & van genderen 2017 pp.8-13 table 1.2 popular optical remote sensing pla...
Muhammad Jazman
 
DOCX
Textbooks on remote sensing
Muhammad Jazman
 
PPTX
Polarization of microwaves
Muhammad Jazman
 
PPTX
How to create a bln file from shp
Muhammad Jazman
 
PPTX
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Muhammad Jazman
 
PPTX
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Muhammad Jazman
 
PPTX
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Muhammad Jazman
 
PPTX
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Muhammad Jazman
 
Fundamental concepts of future city
Muhammad Jazman
 
Pohl & van genderen 2017p5 figure 1.2 electromagnetic spectrum with wavelengt...
Muhammad Jazman
 
Pohl & van genderen 2017 pp.8-13 table 1.2 popular optical remote sensing pla...
Muhammad Jazman
 
Textbooks on remote sensing
Muhammad Jazman
 
Polarization of microwaves
Muhammad Jazman
 
How to create a bln file from shp
Muhammad Jazman
 
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Muhammad Jazman
 
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Muhammad Jazman
 
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Muhammad Jazman
 
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Muhammad Jazman
 
Ad

Recently uploaded (20)

PDF
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
PDF
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
PDF
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
PPTX
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
PDF
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
PDF
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PPTX
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
PDF
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
PDF
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
How Startups Are Growing Faster with App Developers in Australia.pdf
India App Developer
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
"AI Transformation: Directions and Challenges", Pavlo Shaternik
Fwdays
 
Exolore The Essential AI Tools in 2025.pdf
Srinivasan M
 
What Makes Contify’s News API Stand Out: Key Features at a Glance
Contify
 
AI Penetration Testing Essentials: A Cybersecurity Guide for 2025
defencerabbit Team
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
Mastering Financial Management in Direct Selling
Epixel MLM Software
 
CIFDAQ Market Insights for July 7th 2025
CIFDAQ
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
Transcript: New from BookNet Canada for 2025: BNC BiblioShare - Tech Forum 2025
BookNet Canada
 
"Beyond English: Navigating the Challenges of Building a Ukrainian-language R...
Fwdays
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
AUTOMATION AND ROBOTICS IN PHARMA INDUSTRY.pptx
sameeraaabegumm
 
Chris Elwell Woburn, MA - Passionate About IT Innovation
Chris Elwell Woburn, MA
 
IoT-Powered Industrial Transformation – Smart Manufacturing to Connected Heal...
Rejig Digital
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
Ad

Chapter 01 introduction to security

  • 1. Questions & Answers Chapter 1 - Introduction to Security Prowse (2012) 8 Questions Muhammad Jazman, S.Kom.,MInfoSys [email protected] http://sif.uin-suska.ac.id/
  • 2. Question 1 In information security, what are the three main goals? (Select the three best answers.) A. Auditing B. Integrity C. Nonrepudiation D. Confidentiality E. Risk Assessment F. Availability
  • 3. Question 2 To protect against malicious attacks, what should you think like? A. Hacker B. Network admin C. Spoofer D. Auditor
  • 4. Question 3 Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails? A. Authenticity B. Nonrepudiation C. Confidentiality D. Integrity
  • 5. Question 4 Which of the following does the A in CIA stand for when it comes to IT security? Select the best answer. A. Accountability B. Assessment C. Availability D. Auditing
  • 6. Question 5 Which of the following is the greatest risk when it comes to removable storage? A. Integrity of data B. Availability of data C. Confidentiality of data D. Accountability of data
  • 7. Question 6 When it comes to information security, what is the I in CIA? A. Insurrection B. Information C. Indigestion D. Integrity
  • 8. Question 7 You are developing a security plan for your organization. Which of the following is an example of a physical control? A. Password B. DRP C. ID card D. Encryption
  • 9. Question 8 When is a system completely secure? A. When it is updated B. When it is assessed for vulnerabilities C. When all anomalies have been removed D. Never