You will need to achieve a score of 80% or higher to pass the quiz. If you don’t pass on your first attempt, you can retake the quiz as needed.
Knowledge Check 1 Copy
0 of 11 Questions completed
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 11 Questions answered correctly
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
What is the term used to describe the security property that means our information can be read only by people who are allowed to read it?CorrectIncorrect
In reducing the impact of an attack, what can you do to prevent your data being accessed in the event that your computer is stolen?CorrectIncorrect
Which of the following can affect the integrity of data and information?CorrectIncorrect
An attacker will take advantage of the easiest way to bypass the security controls implemented in an organisation. This is also known as the:CorrectIncorrect
Limiting access to information on the need to know basis is an example of:CorrectIncorrect
The likelihood of a given threat source exploiting an existing vulnerability is also known asCorrectIncorrect
The property of safeguarding the accuracy and completeness of information assets is also known asCorrectIncorrect
A potential cause of an unwanted impact to an organization is also known asCorrectIncorrect
Encrypting emails with sensitive content will achieve which security goal?CorrectIncorrect
To an organization, systems that can no longer be patched with security fixes can be considered as a:CorrectIncorrect
What is the term used to describe the security property that means the information can be assessible when needed?CorrectIncorrect