QD15

QD15

University

10 Qs

quiz-placeholder

Similar activities

Segundo Encuentro Recursos Tecnológicos

Segundo Encuentro Recursos Tecnológicos

University

10 Qs

Testează-ți cunoștințele despre numerație

Testează-ți cunoștințele despre numerație

11th Grade - University

15 Qs

Understanding Loops in C Programming

Understanding Loops in C Programming

1st Grade - University

15 Qs

Kuis Komunikasi Visual

Kuis Komunikasi Visual

11th Grade - University

15 Qs

CHAPTER 6: SYSTEM ANALYSIS AND DESIGN

CHAPTER 6: SYSTEM ANALYSIS AND DESIGN

University

14 Qs

Quiz FinTech 10

Quiz FinTech 10

University

10 Qs

QD15

QD15

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

ANDRIAN HERNANDEZ

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Which Philippine law, also known as the Data Privacy Act of 2012, aims to protect the personal information of individuals and ensure the privacy and security of data collected by both public and private sectors?

2.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

Which core principle of the Data Privacy Act ensures that individuals are fully informed about how their personal data is collected, processed, and used?

3.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

What concept refers to the right of individuals to control how their personal information is collected, used, and shared by organizations?

4.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

The practice of protecting digital information from unauthorized access, corruption or theft throughout its entire lifecycle.

5.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

It depends on how well an organization endures or recovers from any type of failure such as from hardware problems to power shortages and other events that affect data availability.

6.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

It uses software to completely overwrite data on any storage device, making it more secure than standard data wiping. It verifies that the data is unrecoverable.

7.

FILL IN THE BLANK QUESTION

45 sec • 1 pt

These tools ease the process of detecting and mitigating vulnerabilities such as out-of-date software, misconfigurations or weak passwords, and can also identify data sources at greatest risk of exposure.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?