Copyright

Types of Information Security

Instructions:

Choose an answer and hit 'next'. You will receive your score and answers at the end.

question 1 of 3

Which of the following is NOT a type of information security?

Create Your Account To Take This Quiz

As a member, you'll also get unlimited access to over 79,000 lessons in math, English, science, history, and more. Plus, get practice tests, quizzes, and personalized coaching to help you succeed.

Try it risk-free
Try it risk-free for 30 days. Cancel anytime
Already registered? Log in here for access

1. What is the purpose of security operations in regards to information security?

2. In regards to information security, which of the following is part of identity and access management?

Create your account to access this entire worksheet
A Premium account gives you access to all lesson, practice exams, quizzes & worksheets
Access to all video lessons
Quizzes, practice exams & worksheets
Certificate of Completion
Access to instructors
Create an account to get started Create Account

About This Quiz & Worksheet

The following questions will help you measure your knowledge of different information security systems and methods. You will be quizzed on specific policies and the ways in which they can be implemented.

Quiz & Worksheet Goals

In this worksheet and quiz, you'll test your understanding of:

  • Examples of information security methods
  • What security operations do
  • Different components of identity and access management

Skills Practiced

  • Reading comprehension - ensure that you draw the most important information from the material, such as the reason that data has to have a recorded owner
  • Information recall - access the knowledge you've gained regarding why security testing needs to be a part of an effective information security plan
  • Knowledge application - use your knowledge to answer questions about different methods used to secure data as well as why data security is so important

Additional Learning

Get a more in-depth look at data security plans by reviewing the lesson titled, Types of Information Security. You will learn about important information, such as:

  • Why asset security is a good first step in a comprehensive plan
  • What kinds of factors security and risk management review
  • How security engineering helps to create a holistic approach to information security
Support