
A-IAS
Authored by KEN ROLLOQUE
Arts
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
One of the goals of "The National Cybersecurity Plan of 2022" is to enhance our ability to respond to cyber threats with resiliency measures before, during, and after attacks.
(a)
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Cybercrime Prevention Act of 2012, also known as R.A. 10176, is the first law in the Philippines that specifically criminalizes computer-related offenses, which before the passing of the act, had no strong legal precedent in Philippine jurisprudence.
(a)
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Data Privacy Act of 2012 (R.A. 10173) outlines the circumstances under which personal information can be processed, primarily requiring direct consent from the data subject.
(a)
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
According to Section 4 of R.A. 9995, any person who violates the prohibitions specified in the said section shall face a prison term of 3 to 10 years and a fine of P100,000.00 up to P500,000.00 as determined by the court.
(a)
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Making banking transactions through ATM switching networks is now an absolute feature mandated by R.A. 8793: E-Commerce Act of 2000
(a)
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
For each (a) the Kerberos Key Distribution Center (KDC) maintains a database of the realm's principal and the principal's associated secret keys
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
At the (a) stage of the certificate life cycle, the certificate is no longer valid
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?