IAS Pointers

IAS Pointers

University

68 Qs

quiz-placeholder

Similar activities

TV AND MOVIE

TV AND MOVIE

KG - Professional Development

70 Qs

Art History Exam Quiz

Art History Exam Quiz

University

73 Qs

Color Schemes Quiz

Color Schemes Quiz

11th Grade - University

70 Qs

Piano Review

Piano Review

10th Grade - University

70 Qs

Art Terminology

Art Terminology

7th Grade - University

64 Qs

Art Appreciation review midterms

Art Appreciation review midterms

University

64 Qs

Art App Finals Reviewer

Art App Finals Reviewer

University

67 Qs

Beginning Music Theory

Beginning Music Theory

9th Grade - University

72 Qs

IAS Pointers

IAS Pointers

Assessment

Quiz

Arts

University

Medium

Created by

KEN ROLLOQUE

Used 1+ times

FREE Resource

68 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü Protection of the confidentiality, integrity, and availability of information assets

2.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use

3.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü A hacker who manipulates the public telephone system to make free calls or disrupt service

4.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü the system of rules which a particular country or community recognizes as regulating the actions of may enforce by the imposition of penalties

5.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü Escalating privileges to gain administrator-level or root access control over a smartphone operating system (typically associated with Apple iOS smartphones)

6.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

The process of defining and specifying the long-term direction to be taken by an organization acquisition of resources needed to pursue this effort

7.

FILL IN THE BLANK QUESTION

3 mins • 1 pt

ü A form of social engineering in which the attacker provides what appears to be a legitimate communication (usually e-mail), but it contains hidden or embedded code that redirects the reply to a third-party site in an effort to extract personal or confidential information

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?