IAS Pointers

IAS Pointers

University

68 Qs

quiz-placeholder

Similar activities

History_Quack

History_Quack

University - Professional Development

73 Qs

Klasa II semestr IV

Klasa II semestr IV

University

70 Qs

T5. El Romanticisme musical

T5. El Romanticisme musical

9th Grade - University

70 Qs

GST_Overview and Basic Concepts

GST_Overview and Basic Concepts

University

64 Qs

Final Exam Review ART

Final Exam Review ART

9th Grade - University

72 Qs

American Revolution Vocabulary Review

American Revolution Vocabulary Review

12th Grade - University

66 Qs

Jazz Quiz

Jazz Quiz

10th Grade - University

65 Qs

2nd Music Test

2nd Music Test

6th Grade - University

63 Qs

IAS Pointers

IAS Pointers

Assessment

Quiz

Arts

University

Medium

Created by

KEN ROLLOQUE

Used 1+ times

FREE Resource

68 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü Protection of the confidentiality, integrity, and availability of information assets

2.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use

3.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü A hacker who manipulates the public telephone system to make free calls or disrupt service

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü the system of rules which a particular country or community recognizes as regulating the actions of may enforce by the imposition of penalties

5.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü Escalating privileges to gain administrator-level or root access control over a smartphone operating system (typically associated with Apple iOS smartphones)

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

The process of defining and specifying the long-term direction to be taken by an organization acquisition of resources needed to pursue this effort

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü A form of social engineering in which the attacker provides what appears to be a legitimate communication (usually e-mail), but it contains hidden or embedded code that redirects the reply to a third-party site in an effort to extract personal or confidential information

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?