
IAS Pointers
Authored by KEN ROLLOQUE
Arts
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
68 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
ü Protection of the confidentiality, integrity, and availability of information assets
2.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
A hacker who intentionally removes or bypasses software copyright protection designed to prevent unauthorized duplication or use
3.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
ü A hacker who manipulates the public telephone system to make free calls or disrupt service
4.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
ü the system of rules which a particular country or community recognizes as regulating the actions of may enforce by the imposition of penalties
5.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
ü Escalating privileges to gain administrator-level or root access control over a smartphone operating system (typically associated with Apple iOS smartphones)
6.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
The process of defining and specifying the long-term direction to be taken by an organization acquisition of resources needed to pursue this effort
7.
FILL IN THE BLANK QUESTION
3 mins • 1 pt
ü A form of social engineering in which the attacker provides what appears to be a legitimate communication (usually e-mail), but it contains hidden or embedded code that redirects the reply to a third-party site in an effort to extract personal or confidential information
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?