EXAM IAS

EXAM IAS

University

40 Qs

quiz-placeholder

Similar activities

xyxtq_BSIT3202ME

xyxtq_BSIT3202ME

University

40 Qs

System Administrator Activities Quiz

System Administrator Activities Quiz

University

40 Qs

Дилнура

Дилнура

University

35 Qs

2nd Quiz

2nd Quiz

University

40 Qs

Prelim Exam - Operating System

Prelim Exam - Operating System

University

40 Qs

IT3182 Cryptology and Network Security Midterm Exam

IT3182 Cryptology and Network Security Midterm Exam

University

40 Qs

AWS Mock test

AWS Mock test

University

35 Qs

Data Structures & Algorithms — Prelim Exam

Data Structures & Algorithms — Prelim Exam

University

40 Qs

EXAM IAS

EXAM IAS

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

twentinyne twentinyne

Used 1+ times

FREE Resource

40 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a system of interrelated computing devices, mechanical and digital machines, objects, animals, or people that are provide with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human computer interaction.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is a set of measures intended to protect and defend

information and information systems.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A practice of defending information from unauthorized access,

use, disclosure, disruption, modification, perusal, inspection,

recording or destruction.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

- also referred as “computer security”.

- information security applied to technology, most often some

form of computer system.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An act of ensuring that data is not lost when critical issues arise.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A malicious act that aims to corrupt or steal data or disrupt an

organization's systems or the entire organization.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A manipulative technique used to deceive individuals into

revealing sensitive or personal information by posing as a

trustworthy source.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?