Discover Information Security Management

Ethics in Cybersecurity Scenario 2
29 questions
Privacy Risks and Principles
5 questions

Privacy Risks and Principles

PersonalizedBowenite avatar
PersonalizedBowenite
Control de Acceso en ISO 27001
6 questions
Cybersecurity Basics
10 questions

Cybersecurity Basics

AwesomeRuthenium avatar
AwesomeRuthenium
Phishing Attacks and Scams
10 questions
Cybersecurity Threats and Campaigns
9 questions
Privacidad y Protección de Datos
40 questions
Digital Signature and Cryptography
0 questions
Authentication in Electronic Communications
10 questions
Introduction to Personal Data
24 questions

Introduction to Personal Data

ObservantProbability avatar
ObservantProbability
Post Tes Keamanan Siber
10 questions
Threat Intelligence Fundamentals
10 questions
Data Protection Principles
10 questions
CIA Triad in Cybersecurity
16 questions
Cybersecurity: Insider Threats
6 questions
Confidentiality and Privacy
10 questions

Confidentiality and Privacy

ConscientiousUranium avatar
ConscientiousUranium
PCI DSS and GLB Act
5 questions

PCI DSS and GLB Act

InestimableTropicalIsland avatar
InestimableTropicalIsland
Tema 2 Isidro
56 questions

Tema 2 Isidro

AffirmativePlum avatar
AffirmativePlum
Cybersecurity Basics Quiz
16 questions

Cybersecurity Basics Quiz

ImportantGladiolus avatar
ImportantGladiolus
Cybersecurity Awareness
18 questions

Cybersecurity Awareness

AwestruckRetinalite avatar
AwestruckRetinalite
Software Flaws and Malware Quiz
30 questions

Software Flaws and Malware Quiz

BeneficiaryJubilation avatar
BeneficiaryJubilation
Full Disk Encryption and Data Protection
23 questions
Use Quizgecko on...
Browser
Browser