Information assurance and security

Information assurance and security

University

25 Qs

quiz-placeholder

Similar activities

IT 101 - Quiz 3

IT 101 - Quiz 3

University

20 Qs

NACOS Kahoot Session II

NACOS Kahoot Session II

University

20 Qs

Chapter 5 Mid Term Quiz - Computer System -

Chapter 5 Mid Term Quiz - Computer System -

5th Grade - University

20 Qs

Quiz_Adv

Quiz_Adv

University

20 Qs

Midterm Exam - DV - Part 1

Midterm Exam - DV - Part 1

University

20 Qs

DWDM Unit1 Quiz

DWDM Unit1 Quiz

University

21 Qs

COA_QUIZ_UNIT I

COA_QUIZ_UNIT I

University

20 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

Information assurance and security

Information assurance and security

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

ABDULLAH MUNDAS

Used 30+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

It is a study of how to protect your information assets from destruction, degredation, manipulation and exploitation. But also, how to recover should any of those happen.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Timely reliable access to data and information services for authorized users.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Protection against unauthorized modification or destruction of information.

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Assurance that information is not disclosed to unauthorized persons.

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

A security measures to establish the validity of transmission, message or originator.

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender's identity, so that neither can later deny having processed the data.

7.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Refers to the protection of hardware, software and data against physical threat's to reduce or prevent disruptions, to operations and loss of assets.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?