
Information assurance and security
Authored by ABDULLAH MUNDAS
Computers
University
Used 30+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
It is a study of how to protect your information assets from destruction, degredation, manipulation and exploitation. But also, how to recover should any of those happen.
2.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Timely reliable access to data and information services for authorized users.
3.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Protection against unauthorized modification or destruction of information.
4.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
Assurance that information is not disclosed to unauthorized persons.
5.
FILL IN THE BLANK QUESTION
30 sec • 1 pt
A security measures to establish the validity of transmission, message or originator.
6.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
Assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender's identity, so that neither can later deny having processed the data.
7.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
Refers to the protection of hardware, software and data against physical threat's to reduce or prevent disruptions, to operations and loss of assets.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?