Quiz 1

The process of converting information or data into a code is __________.
Encryption
Hiding
Protection
Data Mining
A _______________ is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so
Break In
Data Breach
Data Theft
Security Failure
A(n) _______________ is a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.
Security Setting
Data Set
Algorithm
Encryptor
List 3 Ways to create a better security system in an office setting
 
 
{"name":"Quiz 1", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"The process of converting information or data into a code is __________., A _______________ is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so, A(n) _______________ is a process or set of rules to be followed in calculations or other problem-solving operations, especially by a computer.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker