Search Header Logo

Information assurance and security

Authored by ABDULLAH MUNDAS

Computers

University

Used 30+ times

Information assurance and security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

It is a study of how to protect your information assets from destruction, degredation, manipulation and exploitation. But also, how to recover should any of those happen.

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Timely reliable access to data and information services for authorized users.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Protection against unauthorized modification or destruction of information.

4.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Assurance that information is not disclosed to unauthorized persons.

5.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

A security measures to establish the validity of transmission, message or originator.

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Assurance that the sender is provided with proof of a data delivery and recipient is provided with proof of the sender's identity, so that neither can later deny having processed the data.

7.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Refers to the protection of hardware, software and data against physical threat's to reduce or prevent disruptions, to operations and loss of assets.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?