
Information Assurance and Security
Authored by Irene Escauso
Computers
University
Used 68+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Consent is required prior to the collection
of all personal data.
true
false
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Consent is not required for processing where the
data subject is party to a contractual agreement, for
purposes of fulfilling that contract.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
PENALTIES DATA PRIVACY
Ranging from P100,000 to P5,000,000
(approximately US$2,000 to US$100,000)
Imprisonment of 1 year up to 6 years
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Companies with at least 50 employees or access to
the personal and identifiable information of at
least 1,000 people are required to register with the
National Privacy Commission and comply with the
Data Privacy Act of 2012
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
is a weakness in the security system (for example, in procedures, design, or implementation), that might be exploited to cause loss or harm.
vulnerability
threat
attack
control
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A ________to a computing system is a set of circumstances that has the potential to cause loss or harm.
vulnerability
threat
attack
control
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A human who exploits a vulnerability perpetrates an _______ on the system.
vulnerability
threat
attack
Control
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?