EXAM IAS

EXAM IAS

University

40 Qs

quiz-placeholder

Similar activities

Encryption/Decryption

Encryption/Decryption

University

40 Qs

MIDTERMS REVIEWER NETWORKING

MIDTERMS REVIEWER NETWORKING

University

40 Qs

QUIZ 3 - Data Design and Database Management

QUIZ 3 - Data Design and Database Management

University

40 Qs

System Analysis and Design - Implementation

System Analysis and Design - Implementation

12th Grade - University

35 Qs

cybersecurity part 2

cybersecurity part 2

University

40 Qs

Wireless Network Security Quiz

Wireless Network Security Quiz

University

41 Qs

C|EH v10 Footprinting and Reconnaissance Quiz

C|EH v10 Footprinting and Reconnaissance Quiz

University

38 Qs

Administrative Domains Quiz

Administrative Domains Quiz

University

45 Qs

EXAM IAS

EXAM IAS

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

twentinyne twentinyne

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a system of interrelated computing devices, mechanical and digital machines, objects, animals, or people that are provide with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human computer interaction.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a set of measures intended to protect and defend

information and information systems.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A practice of defending information from unauthorized access,

use, disclosure, disruption, modification, perusal, inspection,

recording or destruction.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

- also referred as “computer security”.

- information security applied to technology, most often some

form of computer system.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An act of ensuring that data is not lost when critical issues arise.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A malicious act that aims to corrupt or steal data or disrupt an

organization's systems or the entire organization.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A manipulative technique used to deceive individuals into

revealing sensitive or personal information by posing as a

trustworthy source.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?