Basics of Information Security. Unit 1 and Unit 2 of BOOKLET INTRODUCTION TO IS AND textbook by Morozova
Список вопросов теста
Вопрос 1
Give one of the definitions of Information Security.
Information security is protecting of information and information systems from unauthorized....
Варианты ответов
- use
- disclosure
- disruption
- modification
- perusal
- inspection
- recording
- distraction
- theft
- murder
- drug trafficking
- cybercrime
- violation
- counterfeiting
- access
Вопрос 2
What is a CIA triad of Information Security?
Варианты ответов
- Confidentiality
- Integrity
- Availability
- Car theft
- Cybersecurity
- Computer security
- Identify theft
- Information
- Accountability
- Antiviruses
Вопрос 3
What does the complete computer system include?
Варианты ответов
- Hardware
- Software
- Data
- People
- Texts
- Numbers
- Symbols
- Sounds
- Images
- Spreadsheet
- Students
Вопрос 4
What is data?
Варианты ответов
- Texts
- Numbers
- Sounds
- Images
- Software
- Hardware
- Information
- People
- Students
Вопрос 5
What is a computer?
Варианты ответов
- A computer is an electronic device used to process data.
- A computer is a storage device used to store data.
- A computer is a timer device used to measure time.
- A computer is a molecular device used to count molecules.
Вопрос 6
What does Hardware consist of?
Варианты ответов
- Physical parts of computer
- Electronic devices of computer.
- Parts of computer you can see.
- Parts of computer you cannot see.
- Programms used by computer
- Instructions stored on computer
- Data processed by computer.
Вопрос 7
What does Software consist of?
Варианты ответов
- Physical parts of computer.
- Electronic devices of computer.
- Parts of computer you can see.
- Programs run on computer.
- Organized sets of Instructions
Вопрос 8
What is the brain of computer?
Варианты ответов
- Memory
- CPU
- Storage
- Keyboard
- Mouse
Вопрос 9
Match the words and their definitions.
1.
Overview
2.
Device
3.
To process
4.
To convert
5.
Complete
6.
To include
7.
To consist of
8.
To control
9.
Storage
10.
To devide
Варианты ответов
- Обзор
- Устройство
- Обрабатывать
- Преобразовывать
- Завершенный, законченный
- Включать в себя
- Состоять из
- Управлять
- Запоминающее устройство
- Делить
Вопрос 10
Match the words with their definitions
1.
Input device
2.
Output device
3.
To measure
4.
Source
5.
To perform
6.
To allow
7.
Currently
8.
Certain
9.
Particular
10.
Spreadsheet
Варианты ответов
- Устройство ввода
- Устройство вывода
- Измерять
- Источник
- Выполнять
- Разрешать
- В настоящее время
- Определенный
- Особенный
- Электронная таблица
Вопрос 11
What are the examples of input devices?
Варианты ответов
- Keyboard
- Mouse
- Monitor
- Speakers
- Printer
- Headphones
Вопрос 12
What are the examples of output devices?
Варианты ответов
- Keyboard
- Mouse
- Monitor
- Speakers
- Printer
- Headphones
Вопрос 13
What components of a computer system perform data processing?
Варианты ответов
- Processor
- Memory
- Monitor
- Headphones
- Speakers
- Motherboard
Вопрос 14
What does computer security focus on?
Answer: Computer security can focus on ...
Варианты ответов
- ensuring the availability and correct operation of a computer system without concern for the information stored or processed by the computer.
- ensuring the availability and correct operation of a computer system with concern for the information stored or processed by the computer.
Вопрос 15
True or False.
The terms information security, computer security and information assurance are frequently incorrectly used interchangeably.
Варианты ответов
- True or False
Вопрос 16
True or False.
Information security is concerned with confidentiality, integrity and availability of data regardless of the form the data may take: electronic, print or other forms.
Варианты ответов
- True or False
Вопрос 17
True or False
Information assurance is the act of ensuring that data is not lost when critical issues arise. These issues include but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost.
Варианты ответов
- True or False
Вопрос 18
What are the most common methods of providing information assurance?
Варианты ответов
- One of the most common methods of providing information assurance is to have an off-site backup of the data in case one of the mentioned issues arise.
- One of the most common methods of providing information assurance is to store data on hard discs.
- One of the most common methods of providing information assurance is to record data on CD.
Вопрос 19
Information Systems are composed in three main portions (parts):
Варианты ответов
- hardware
- software
- communications
- data
- memory
- storage
- networks
Вопрос 20
What are the three levels or layers of information security industry statndarts:
Варианты ответов
- physical
- personal
- organizational
- industrial
- intelligent
- political
- military
Вопрос 21
True or False
Information security, computer security and information assurance are the same things.
Варианты ответов
- True or False
Вопрос 22
Match the words with their definitions
1.
access
2.
use
3.
disclosure
4.
disruption
5.
modification
6.
perusal
7.
inspection
8.
recording
9.
distruction
Варианты ответов
- доступ
- использование
- раскрытие
- разрушение
- изменение
- прочтение
- просмотр
- запись
- уничтожение