ICSS Unit 6

ICSS Unit 6

University - Professional Development

15 Qs

quiz-placeholder

Similar activities

Tech-Law Quiz

Tech-Law Quiz

University

10 Qs

OPERATING SYSTEM

OPERATING SYSTEM

University

18 Qs

Software Development

Software Development

University

11 Qs

Topic 1.4.B

Topic 1.4.B

11th Grade - University

20 Qs

tally

tally

University

12 Qs

LLB10403 Quiz 2 Chap 2

LLB10403 Quiz 2 Chap 2

University

20 Qs

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

Cloud Computing

Cloud Computing

University

10 Qs

ICSS Unit 6

ICSS Unit 6

Assessment

Quiz

Computers

University - Professional Development

Medium

Created by

Oh Heng

Used 14+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

What does PDPA Stand for?

Personal Data Preventive Act

Personal Data Protection Act

Private Data Protection Act

Private Data Preventive Act

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is Not a CONCEPT for PDPA?

Consent

Purpose

Reasonableness

Data

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which option is the way to ensure customer data is secure?

invest in management security

invest in customer relationship management

ensure DNC system is implemented

ensure PDPA system is implemented

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What are the way to ethically gain customer data

provide online quiz asking for specific information,

Allow customers to share data in their own ways

design a open policy to display on website

provide straightforward survey asking for specific information

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

DRMF is one of the security application to improve business security. It stands for

dual-tone multi-frequency measure

dual-tone multi-frequency masking

deep-tone multi-frequency masking

dual-tone multi-frequency mechanic

6.

FILL IN THE BLANK QUESTION

1 min • 5 pts

What are consequences of data breach?

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What are Trojans?

malicious software programs that are disguised as legitimate programs

software programs that helps to delete file

software programs that are used to recover lost files

malicious software programs that are helps to protect system application

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?