Search Header Logo

Identificación de amenazas y vulnerabilidades

Authored by Patricia Moreno

Computers

Professional Development

Used 3+ times

Identificación de amenazas y vulnerabilidades
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

FILL IN THE BLANKS QUESTION

10 sec • 1 pt

Acceso a la red o al sistema de información por personas no autorizadas

(a)  

2.

FILL IN THE BLANKS QUESTION

10 sec • 1 pt

Ataques terroristas.

(a)  

3.

FILL IN THE BLANKS QUESTION

10 sec • 1 pt

Ausencia de política de escritorio limpio y pantalla clara.

(a)  

4.

FILL IN THE BLANKS QUESTION

10 sec • 1 pt

Cambio involuntario de datos en un sistema de información

(a)  

5.

FILL IN THE BLANKS QUESTION

10 sec • 1 pt

Carencia o mala implementación de la auditoría interna

(a)  

6.

FILL IN THE BLANKS QUESTION

10 sec • 1 pt

Clasificación inadecuada de la información

(a)  

7.

FILL IN THE BLANKS QUESTION

10 sec • 1 pt

Conexiones a red pública desprotegidas.

(a)  

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?