IAS Pointers

IAS Pointers

University

68 Qs

quiz-placeholder

Similar activities

untitled

untitled

1st Grade - University

70 Qs

Hair Quiz

Hair Quiz

University - Professional Development

65 Qs

Art Appreciation_Midterms

Art Appreciation_Midterms

University

67 Qs

Glasba skozi zgodovino (začetki gl- srednji vek)

Glasba skozi zgodovino (začetki gl- srednji vek)

9th Grade - University

65 Qs

3D Modeling & Rigging

3D Modeling & Rigging

University

66 Qs

Final Exam Art 1

Final Exam Art 1

9th Grade - University

70 Qs

FAVA Mock Finals (Painting)

FAVA Mock Finals (Painting)

University

70 Qs

IAS Pointers

IAS Pointers

Assessment

Quiz

Arts

University

Practice Problem

Medium

Created by

KEN ROLLOQUE

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

68 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü Protection of the confidentiality, integrity, and availability of information assets

2.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use

3.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü A hacker who manipulates the public telephone system to make free calls or disrupt service

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü the system of rules which a particular country or community recognizes as regulating the actions of may enforce by the imposition of penalties

5.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü Escalating privileges to gain administrator-level or root access control over a smartphone operating system (typically associated with Apple iOS smartphones)

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

The process of defining and specifying the long-term direction to be taken by an organization acquisition of resources needed to pursue this effort

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü A form of social engineering in which the attacker provides what appears to be a legitimate communication (usually e-mail), but it contains hidden or embedded code that redirects the reply to a third-party site in an effort to extract personal or confidential information

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?