SlideShare a Scribd company logo
Questions & Answers
Chapter 1 - Introduction to Security
Prowse (2012)
8 Questions
Muhammad Jazman, S.Kom.,MInfoSys
jazman@uin-suska.ac.id
http://sif.uin-suska.ac.id/
Question 1
In information security, what are the three main
goals? (Select the three best answers.)
A. Auditing
B. Integrity
C. Nonrepudiation
D. Confidentiality
E. Risk Assessment
F. Availability
Question 2
To protect against malicious attacks, what
should you think like?
A. Hacker
B. Network admin
C. Spoofer
D. Auditor
Question 3
Tom sends out many e-mails containing secure
information to other companies. What concept
should be implemented to prove that Tom did
indeed send the e-mails?
A. Authenticity
B. Nonrepudiation
C. Confidentiality
D. Integrity
Question 4
Which of the following does the A in CIA stand
for when it comes to IT security?
Select the best answer.
A. Accountability
B. Assessment
C. Availability
D. Auditing
Question 5
Which of the following is the greatest risk when it
comes to removable storage?
A. Integrity of data
B. Availability of data
C. Confidentiality of data
D. Accountability of data
Question 6
When it comes to information security, what is
the I in CIA?
A. Insurrection
B. Information
C. Indigestion
D. Integrity
Question 7
You are developing a security plan for your
organization. Which of the following is an
example of a physical control?
A. Password
B. DRP
C. ID card
D. Encryption
Question 8
When is a system completely secure?
A. When it is updated
B. When it is assessed for vulnerabilities
C. When all anomalies have been removed
D. Never

More Related Content

PPTX
5 Reasons to Backup Twitter
PDF
BAIT1103 Tutorial 1
PPTX
SITSecure Audits
PPTX
Internet Safety
ODP
Its presentation
PPTX
ET4045-1-Introduction-2014
PDF
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
PPTX
Top 5 cases of Data Breach caused by Human Error
5 Reasons to Backup Twitter
BAIT1103 Tutorial 1
SITSecure Audits
Internet Safety
Its presentation
ET4045-1-Introduction-2014
World Password Day Tips- 10 Common Password Mistakes to Avoid in 2018
Top 5 cases of Data Breach caused by Human Error

Similar to Chapter 01 introduction to security (20)

PDF
Concepts of Cyber Security lecture notes.pdf
PPT
sect1--ch1--intro.ppt
PDF
information security introduction for campus students.pdf
DOCX
Information security
PPT
Information Security
PPT
InfoSecConcepts.ppt
PPT
ch01.ppt
PPT
educational content, educational contented educational content
PPT
information security presentation topics
PPT
CISSP Certified Information System Security Professional_009.ppt
PPT
INFORMATION SECURITY STUDY GUIDE for STUDENTS
PPTX
Module 2 - Information Assurance Concepts.pptx
PPTX
Security & Risk Mgmt_WK1.pptx
PPTX
Security & Risk Mgmt_WK1.pptx
PPTX
Information and network security 2 nist security definition
DOCX
Unit I Q&A.docx
PPTX
Cyber-security Vs Information Security.pptx
PPTX
Information Security Lecture One for Basic
PPTX
ISM-CS5750-01.pptx
PPTX
security IDS
Concepts of Cyber Security lecture notes.pdf
sect1--ch1--intro.ppt
information security introduction for campus students.pdf
Information security
Information Security
InfoSecConcepts.ppt
ch01.ppt
educational content, educational contented educational content
information security presentation topics
CISSP Certified Information System Security Professional_009.ppt
INFORMATION SECURITY STUDY GUIDE for STUDENTS
Module 2 - Information Assurance Concepts.pptx
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
Information and network security 2 nist security definition
Unit I Q&A.docx
Cyber-security Vs Information Security.pptx
Information Security Lecture One for Basic
ISM-CS5750-01.pptx
security IDS
Ad

More from Muhammad Jazman (10)

DOCX
Fundamental concepts of future city
PDF
Pohl & van genderen 2017p5 figure 1.2 electromagnetic spectrum with wavelengt...
DOCX
Pohl & van genderen 2017 pp.8-13 table 1.2 popular optical remote sensing pla...
DOCX
Textbooks on remote sensing
PPTX
Polarization of microwaves
PPTX
How to create a bln file from shp
PPTX
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
PPTX
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
PPTX
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
PPTX
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Fundamental concepts of future city
Pohl & van genderen 2017p5 figure 1.2 electromagnetic spectrum with wavelengt...
Pohl & van genderen 2017 pp.8-13 table 1.2 popular optical remote sensing pla...
Textbooks on remote sensing
Polarization of microwaves
How to create a bln file from shp
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Graham et.al, 2008, Foundations of Software Testing ISTQB Certification. Chap...
Ad

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Spectroscopy.pptx food analysis technology
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
KodekX | Application Modernization Development
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPT
Teaching material agriculture food technology
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
MIND Revenue Release Quarter 2 2025 Press Release
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectroscopy.pptx food analysis technology
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Review of recent advances in non-invasive hemoglobin estimation
Understanding_Digital_Forensics_Presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The AUB Centre for AI in Media Proposal.docx
Mobile App Security Testing_ A Comprehensive Guide.pdf
KodekX | Application Modernization Development
Dropbox Q2 2025 Financial Results & Investor Presentation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Teaching material agriculture food technology
20250228 LYD VKU AI Blended-Learning.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Machine learning based COVID-19 study performance prediction
Unlocking AI with Model Context Protocol (MCP)
MIND Revenue Release Quarter 2 2025 Press Release

Chapter 01 introduction to security

  • 1. Questions & Answers Chapter 1 - Introduction to Security Prowse (2012) 8 Questions Muhammad Jazman, S.Kom.,MInfoSys jazman@uin-suska.ac.id http://sif.uin-suska.ac.id/
  • 2. Question 1 In information security, what are the three main goals? (Select the three best answers.) A. Auditing B. Integrity C. Nonrepudiation D. Confidentiality E. Risk Assessment F. Availability
  • 3. Question 2 To protect against malicious attacks, what should you think like? A. Hacker B. Network admin C. Spoofer D. Auditor
  • 4. Question 3 Tom sends out many e-mails containing secure information to other companies. What concept should be implemented to prove that Tom did indeed send the e-mails? A. Authenticity B. Nonrepudiation C. Confidentiality D. Integrity
  • 5. Question 4 Which of the following does the A in CIA stand for when it comes to IT security? Select the best answer. A. Accountability B. Assessment C. Availability D. Auditing
  • 6. Question 5 Which of the following is the greatest risk when it comes to removable storage? A. Integrity of data B. Availability of data C. Confidentiality of data D. Accountability of data
  • 7. Question 6 When it comes to information security, what is the I in CIA? A. Insurrection B. Information C. Indigestion D. Integrity
  • 8. Question 7 You are developing a security plan for your organization. Which of the following is an example of a physical control? A. Password B. DRP C. ID card D. Encryption
  • 9. Question 8 When is a system completely secure? A. When it is updated B. When it is assessed for vulnerabilities C. When all anomalies have been removed D. Never