
Information Security
Authored by eder hernandez
Instructional Technology
7th Grade
Used 19+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Mexico has a law that regulates the processing of personal data by private sector companies:
Federal copyright law
the Federal Law on Protection of Personal Data Held by Private Parties
Industrial property law
Federal penal code
2.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Is a set of punitive legal norms of a State:
Federal copyright law
the Federal Law on Protection of Personal Data Held by Private Parties
Industrial property law
Federal penal code
3.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Is the instrument through which the rights of authors are protected in Mexico:
Federal copyright law
the Federal Law on Protection of Personal Data Held by Private Parties
Industrial property law
Federal penal code
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Protects the interests of the creators of inventions, symbols, names, images, drawings, trademarks, designations of origin and even industrial secrets for companies or businesses that have a new sales system, secret recipes, methodologies, bases data and even customer or supplier lists:
Federal copyright law
the Federal Law on Protection of Personal Data Held by Private Parties
Industrial property law
Federal penal code
5.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
This standard also provides a framework to identify and implement solutions for the following risks:
Security policy, Organization of security, Personal security, Physical and environmental security, Access control, Development and maintenance of the system, Business continuity plan
ISO 17799 (BS-7799)
NIST SP 800
COBIT
ISO/IEC 27001
6.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
is a framework created by ISACA (Information Systems Audit and Control association) for information technology management and IT governance, it is a set of support tools that allow administrators to reduce the separation between the needs of control, technical issues and business risks.:
ISO 17799 (BS-7799)
NIST SP 800
COBIT
ISO/IEC 27001
7.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Information security management systems requirements, standard that allows certifying the implementation of an information security management system.
approved and published as an international standard in October 2005:
ISO 17799 (BS-7799)
NIST SP 800
COBIT
ISO/IEC 27001
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
6 questions
Digital Forensic Scientist
Quiz
•
7th Grade
5 questions
Quiz on Newton's Laws of Motion
Quiz
•
7th Grade
12 questions
Kazoon Tetrahedron Kite Quiz
Quiz
•
6th - 8th Grade
15 questions
AAVC Careers
Quiz
•
7th Grade
15 questions
EmTech Q1 M2, Online Safety, Security, Ethics, and Etiquette
Quiz
•
7th Grade
11 questions
Parts of a Camera 2
Quiz
•
7th Grade
11 questions
PROCESO TECNOLÓGICO
Quiz
•
7th - 9th Grade
10 questions
Soal Pilihan Ganda
Quiz
•
7th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade