
Identificación de amenazas y vulnerabilidades
Authored by Patricia Moreno
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
FILL IN THE BLANKS QUESTION
10 sec • 1 pt
Acceso a la red o al sistema de información por personas no autorizadas
(a)
2.
FILL IN THE BLANKS QUESTION
10 sec • 1 pt
Ataques terroristas.
(a)
3.
FILL IN THE BLANKS QUESTION
10 sec • 1 pt
Ausencia de política de escritorio limpio y pantalla clara.
(a)
4.
FILL IN THE BLANKS QUESTION
10 sec • 1 pt
Cambio involuntario de datos en un sistema de información
(a)
5.
FILL IN THE BLANKS QUESTION
10 sec • 1 pt
Carencia o mala implementación de la auditoría interna
(a)
6.
FILL IN THE BLANKS QUESTION
10 sec • 1 pt
Clasificación inadecuada de la información
(a)
7.
FILL IN THE BLANKS QUESTION
10 sec • 1 pt
Conexiones a red pública desprotegidas.
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?