IAS Pointers

IAS Pointers

University

68 Qs

quiz-placeholder

Similar activities

Final Exam Art 1

Final Exam Art 1

9th Grade - University

64 Qs

ART APP-PRELIM ACTIVE RECALL

ART APP-PRELIM ACTIVE RECALL

University

65 Qs

3D Modeling & Rigging

3D Modeling & Rigging

University

66 Qs

Art Appreciation_Midterms

Art Appreciation_Midterms

University

67 Qs

FAVA Mock Finals (Painting)

FAVA Mock Finals (Painting)

University

70 Qs

RELATIVE CLAUSES DEFINING AND NON-DEFINING CLAUSES

RELATIVE CLAUSES DEFINING AND NON-DEFINING CLAUSES

2nd Grade - University

70 Qs

SO EASY PLS LIKE AND PLAY SOME MORE OF MY GAMES ILL MAKE MORE!!!

SO EASY PLS LIKE AND PLAY SOME MORE OF MY GAMES ILL MAKE MORE!!!

University

73 Qs

MArketing Management -fundamental

MArketing Management -fundamental

University

65 Qs

IAS Pointers

IAS Pointers

Assessment

Quiz

Arts

University

Medium

Created by

KEN ROLLOQUE

Used 1+ times

FREE Resource

68 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü Protection of the confidentiality, integrity, and availability of information assets

2.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use

3.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü A hacker who manipulates the public telephone system to make free calls or disrupt service

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü the system of rules which a particular country or community recognizes as regulating the actions of may enforce by the imposition of penalties

5.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü Escalating privileges to gain administrator-level or root access control over a smartphone operating system (typically associated with Apple iOS smartphones)

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

The process of defining and specifying the long-term direction to be taken by an organization acquisition of resources needed to pursue this effort

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü A form of social engineering in which the attacker provides what appears to be a legitimate communication (usually e-mail), but it contains hidden or embedded code that redirects the reply to a third-party site in an effort to extract personal or confidential information

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?