
EXAM IAS
Authored by twentinyne twentinyne
Information Technology (IT)
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
It is a system of interrelated computing devices, mechanical and digital machines, objects, animals, or people that are provide with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human computer interaction.
(a)
2.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
It is a set of measures intended to protect and defend
information and information systems.
(a)
3.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
A practice of defending information from unauthorized access,
use, disclosure, disruption, modification, perusal, inspection,
recording or destruction.
(a)
4.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
- also referred as “computer security”.
- information security applied to technology, most often some
form of computer system.
(a)
5.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
An act of ensuring that data is not lost when critical issues arise.
(a)
6.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
A malicious act that aims to corrupt or steal data or disrupt an
organization's systems or the entire organization.
(a)
7.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
A manipulative technique used to deceive individuals into
revealing sensitive or personal information by posing as a
trustworthy source.
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?