Search Header Logo

EXAM IAS

Authored by twentinyne twentinyne

Information Technology (IT)

University

Used 1+ times

EXAM IAS
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a system of interrelated computing devices, mechanical and digital machines, objects, animals, or people that are provide with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human computer interaction.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a set of measures intended to protect and defend

information and information systems.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A practice of defending information from unauthorized access,

use, disclosure, disruption, modification, perusal, inspection,

recording or destruction.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

- also referred as “computer security”.

- information security applied to technology, most often some

form of computer system.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An act of ensuring that data is not lost when critical issues arise.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A malicious act that aims to corrupt or steal data or disrupt an

organization's systems or the entire organization.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A manipulative technique used to deceive individuals into

revealing sensitive or personal information by posing as a

trustworthy source.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?