Information assurance and security

Information assurance and security

University

25 Qs

quiz-placeholder

Similar activities

Digital and Analog transmission

Digital and Analog transmission

University

20 Qs

ICT Unit-2

ICT Unit-2

University

20 Qs

2.3.1 Graph Traversal & Path Finding Algorithms

2.3.1 Graph Traversal & Path Finding Algorithms

12th Grade - University

20 Qs

Quiz Harian Gdevelop MPK

Quiz Harian Gdevelop MPK

University

20 Qs

Input/Output

Input/Output

University

20 Qs

Algoritma Pemrograman

Algoritma Pemrograman

University

20 Qs

Test PKS 1 - Modul 2

Test PKS 1 - Modul 2

University

20 Qs

3D Objects - Terms & Transfomations

3D Objects - Terms & Transfomations

6th Grade - Professional Development

20 Qs

Information assurance and security

Information assurance and security

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

ABDULLAH MUNDAS

Used 30+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

It is a study of how to protect your information assets from destruction, degredation, manipulation and exploitation. But also, how to recover should any of those happen.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Timely reliable access to data and information services for authorized users.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Protection against unauthorized modification or destruction of information.

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Assurance that information is not disclosed to unauthorized persons.

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

A security measures to establish the validity of transmission, message or originator.

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender's identity, so that neither can later deny having processed the data.

7.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Refers to the protection of hardware, software and data against physical threat's to reduce or prevent disruptions, to operations and loss of assets.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?