Search Header Logo

IAaS Quiz No.1

Authored by Wilbert Benedicto

Computers

University

Used 3+ times

IAaS Quiz No.1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

the process of assuring information and controlling risks associated with the usage, processing, storage, and transmission of information or data, as well as the systems and procedures used for those objectives.

2.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

The practice of keeping information safe from being accessed, used, shared, disrupted, changed, looked at, inspected, recorded, or destroyed by people who shouldn't be able to.

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

The process of preventing the loss of data when critical issues develop.

4.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

__________ is sometimes referred to as technology-based security (most often used some form of computer system).

5.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

_____________ was the prevention of inappropriate information alteration or damage and assuring non-repudiation and authenticity

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

The first process of Risk Identification

7.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

This Pillar involves respecting permitted access and disclosure limitation, including personal privacy and proprietary information

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?