QD15

QD15

University

10 Qs

quiz-placeholder

Similar activities

Data Mining Methodologies and Applications

Data Mining Methodologies and Applications

University

10 Qs

Security Compliance

Security Compliance

University

15 Qs

3.1(a)(b) - Lecture

3.1(a)(b) - Lecture

University

15 Qs

Ethics - Week 5 Revision

Ethics - Week 5 Revision

University

10 Qs

Quiz on Information Systems

Quiz on Information Systems

University

14 Qs

M2_W2_Cloud_Computing

M2_W2_Cloud_Computing

University

15 Qs

TcP252_k32_FQ1

TcP252_k32_FQ1

University

12 Qs

10 ARTIFICIAL INTELLIGENCE

10 ARTIFICIAL INTELLIGENCE

10th Grade - University

10 Qs

QD15

QD15

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

ANDRIAN HERNANDEZ

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Which Philippine law, also known as the Data Privacy Act of 2012, aims to protect the personal information of individuals and ensure the privacy and security of data collected by both public and private sectors?

2.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Which core principle of the Data Privacy Act ensures that individuals are fully informed about how their personal data is collected, processed, and used?

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

What concept refers to the right of individuals to control how their personal information is collected, used, and shared by organizations?

4.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

The practice of protecting digital information from unauthorized access, corruption or theft throughout its entire lifecycle.

5.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

It depends on how well an organization endures or recovers from any type of failure such as from hardware problems to power shortages and other events that affect data availability.

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

It uses software to completely overwrite data on any storage device, making it more secure than standard data wiping. It verifies that the data is unrecoverable.

7.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

These tools ease the process of detecting and mitigating vulnerabilities such as out-of-date software, misconfigurations or weak passwords, and can also identify data sources at greatest risk of exposure.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?