Information Assurance and Security Midterm

Information Assurance and Security Midterm

University

25 Qs

quiz-placeholder

Similar activities

Introduction to Computing Quiz

Introduction to Computing Quiz

University

30 Qs

IT Essentials Ch 4 Review - Preventive Maintenance & Trouble

IT Essentials Ch 4 Review - Preventive Maintenance & Trouble

10th Grade - University

24 Qs

Introduction to Computers

Introduction to Computers

University

25 Qs

FIREWALL ️‍🔥

FIREWALL ️‍🔥

University

30 Qs

Test blanc

Test blanc

University

20 Qs

Hardware & Software

Hardware & Software

KG - University

20 Qs

DCI 2025 Quiz 1

DCI 2025 Quiz 1

University

30 Qs

Computer Software and Hardware Quiz

Computer Software and Hardware Quiz

University

20 Qs

Information Assurance and Security Midterm

Information Assurance and Security Midterm

Assessment

Quiz

Computers

University

Medium

Created by

Ryan Intong

Used 1+ times

FREE Resource

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 3 pts

A law in the Philippines that aims to prevent and punish cybercrime?

2.

FILL IN THE BLANK QUESTION

1 min • 3 pts

Creation, alteration, or use of a digital signature, electronic documents with the intent to deceive others?

3.

FILL IN THE BLANK QUESTION

1 min • 3 pts

Penalties for committing computer-related forgery is imprisonment 6 years and 1 day to how many years?

4.

FILL IN THE BLANK QUESTION

1 min • 3 pts

Involves stealing someone else's personal information like creating fake social media accounts?

5.

FILL IN THE BLANK QUESTION

1 min • 3 pts

Involves using a computer or the internet to deceive others like Phishing scams?

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When committed intentionally, the access to the

whole or any part of a computer system without

right; often referred to as “hacking”, “cracking”, or

“computer.

Illegal Access

Illegal Interception

Data Interference

Cyber squatting

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Enables an offender to

eavesdrop on communications between the

sender and receiver and/or impersonate the

sender and/or receiver and communicate on their

behalf.

Illegal Access

Illegal Interception

Data Interference

System Interference

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?