
IAaS Quiz No.1
Authored by Wilbert Benedicto
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
the process of assuring information and controlling risks associated with the usage, processing, storage, and transmission of information or data, as well as the systems and procedures used for those objectives.
2.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
The practice of keeping information safe from being accessed, used, shared, disrupted, changed, looked at, inspected, recorded, or destroyed by people who shouldn't be able to.
3.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
The process of preventing the loss of data when critical issues develop.
4.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
__________ is sometimes referred to as technology-based security (most often used some form of computer system).
5.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
_____________ was the prevention of inappropriate information alteration or damage and assuring non-repudiation and authenticity
6.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
The first process of Risk Identification
7.
FILL IN THE BLANK QUESTION
45 sec • 1 pt
This Pillar involves respecting permitted access and disclosure limitation, including personal privacy and proprietary information
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?