
Information Assurance and Security
Authored by Yong Elveña
Computers
University
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
20 sec • 2 pts
________________ is the study of how to protect your information assets from destruction, degradation, manipulation and exploitation.
2.
FILL IN THE BLANK QUESTION
20 sec • 2 pts
_______________ is to emphasize the authority of the real person or owner of a certain account.
3.
FILL IN THE BLANK QUESTION
20 sec • 2 pts
_______________ measures the security to establish the validity of a transmission, message, or originator.
4.
FILL IN THE BLANK QUESTION
20 sec • 2 pts
In information Assurance and Security, under the threat the ___________ is a very root cause of an evil intent if possess danger to all asset
5.
FILL IN THE BLANK QUESTION
20 sec • 2 pts
_______________ is the assurance that information is not disclosed to unauthorized persons.
6.
MULTIPLE CHOICE QUESTION
20 sec • 2 pts
It is a Security measures that establish the validity of a transmission, message or originator.
Authentication
Confidentiality
Availability
Integrity
All of the Above
7.
MULTIPLE CHOICE QUESTION
20 sec • 2 pts
Under RISK in Information Assurance, one measure of the cause of the realized factor is the:
Can help personnel to save their data/s
Confidential information is being at stake
Helpful to humankind
Potential for loss, damage, or destruction of
an asset
All of the Above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?