Search Header Logo

Information Security

Authored by eder hernandez

Instructional Technology

7th Grade

Used 19+ times

Information Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Mexico has a law that regulates the processing of personal data by private sector companies:

Federal copyright law

the Federal Law on Protection of Personal Data Held by Private Parties

Industrial property law

Federal penal code

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Is a set of punitive legal norms of a State:

Federal copyright law

the Federal Law on Protection of Personal Data Held by Private Parties

Industrial property law

Federal penal code

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Is the instrument through which the rights of authors are protected in Mexico:

Federal copyright law

the Federal Law on Protection of Personal Data Held by Private Parties

Industrial property law

Federal penal code

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Protects the interests of the creators of inventions, symbols, names, images, drawings, trademarks, designations of origin and even industrial secrets for companies or businesses that have a new sales system, secret recipes, methodologies, bases data and even customer or supplier lists:

Federal copyright law

the Federal Law on Protection of Personal Data Held by Private Parties

Industrial property law

Federal penal code

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

This standard also provides a framework to identify and implement solutions for the following risks:

Security policy,  Organization of security, Personal security, Physical and environmental security, Access control, Development and maintenance of the system, Business continuity plan

ISO 17799 (BS-7799)

NIST SP 800

COBIT

ISO/IEC 27001

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

is a framework created by ISACA (Information Systems Audit and Control association) for information technology management and IT governance, it is a set of support tools that allow administrators to reduce the separation between the needs of control, technical issues and business risks.:

ISO 17799 (BS-7799)

NIST SP 800

COBIT

ISO/IEC 27001

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Information security management systems requirements, standard that allows certifying the implementation of an information security management system.

approved and published as an international standard in October 2005:

ISO 17799 (BS-7799)

NIST SP 800

COBIT

ISO/IEC 27001

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology