Discover Information Security

Məlumatların Qorunması Prinsipləri
10 questions
OPSEC Threat Analysis
12 questions

OPSEC Threat Analysis

WealthyApostrophe avatar
WealthyApostrophe
Ethics in Cybersecurity Scenario 2
29 questions
Privacy Risks and Principles
5 questions

Privacy Risks and Principles

PersonalizedBowenite avatar
PersonalizedBowenite
Control de Acceso en ISO 27001
6 questions
Cybersecurity Basics
10 questions

Cybersecurity Basics

AwesomeRuthenium avatar
AwesomeRuthenium
Phishing Attacks and Scams
10 questions
Cybersecurity Threats and Campaigns
9 questions
Privacidad y Protección de Datos
40 questions
Digital Signature and Cryptography
0 questions
Authentication in Electronic Communications
10 questions
Introduction to Personal Data
24 questions

Introduction to Personal Data

ObservantProbability avatar
ObservantProbability
G-EMIR Emergency Incident Reports Part 4
8 questions
Post Tes Keamanan Siber
10 questions
Threat Intelligence Fundamentals
10 questions
Data Protection Principles
10 questions
CIA Triad in Cybersecurity
16 questions
Cybersecurity: Insider Threats
6 questions
Data Management and Access Rights
24 questions
SABSA Asset Architecture and Management
40 questions
Confidentiality and Privacy
10 questions

Confidentiality and Privacy

ConscientiousUranium avatar
ConscientiousUranium
PCI DSS and GLB Act
5 questions

PCI DSS and GLB Act

InestimableTropicalIsland avatar
InestimableTropicalIsland
Tema 2 Isidro
56 questions

Tema 2 Isidro

AffirmativePlum avatar
AffirmativePlum
Use Quizgecko on...
Browser
Browser