Information Assurance and Security

Information Assurance and Security

University

9 Qs

quiz-placeholder

Similar activities

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

Cyber Security

Cyber Security

12th Grade - Professional Development

8 Qs

Ethical Issues and Privacy

Ethical Issues and Privacy

University

9 Qs

Quiz 1 - Malicious Software

Quiz 1 - Malicious Software

University

14 Qs

Cybersecurity Fundamentals Week 1 Quiz

Cybersecurity Fundamentals Week 1 Quiz

KG - University

10 Qs

Module 10-LAN Security

Module 10-LAN Security

9th Grade - University

9 Qs

Cybersecurity Ess

Cybersecurity Ess

University

10 Qs

Information Assurance and Security

Information Assurance and Security

Assessment

Quiz

Computers

University

Medium

Created by

Irene Escauso

Used 66+ times

FREE Resource

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Consent is required prior to the collection

of all personal data.

true

false

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Consent is not required for processing where the

data subject is party to a contractual agreement, for

purposes of fulfilling that contract.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

PENALTIES DATA PRIVACY

Ranging from P100,000 to P5,000,000

(approximately US$2,000 to US$100,000)

Imprisonment of 1 year up to 6 years

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Companies with at least 50 employees or access to

the personal and identifiable information of at

least 1,000 people are required to register with the

National Privacy Commission and comply with the

Data Privacy Act of 2012

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

is a weakness in the security system (for example, in procedures, design, or implementation), that might be exploited to cause loss or harm.

vulnerability

threat

attack

control

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ________to a computing system is a set of circumstances that has the potential to cause loss or harm.

vulnerability

threat

attack

control

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A human who exploits a vulnerability perpetrates an _______ on the system.

vulnerability

threat

attack

Control

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

We use a _______ as a protective measure. That is, a control is an action, device, procedure, or technique that removes or reduces a vulnerability.

vulnerability

threat

attack

control

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The processing of personal data shall be allowed

subject to adherence to the principles of:

transparency, legitimate purpose and proportionality

TRUE

FALSE