Time limit: 0
Quiz Summary
0 of 14 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 14 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Unfortunately, you didn’t pass the quiz, but hey, you have unlimited access.😎
Practice makes you perfect! 👊 -
Congratulations! 🥳
You have passed the quiz successfully! You are one step closer to pass the real exam!
We hope to see you again on another certification path.✌️
Good luck with the exam! Stay strong.👊
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 14
1. Question
______________ is a set of rules designed to give EU citizens more control over their personal data.
CorrectIncorrect -
Question 2 of 14
2. Question
A _______________ is an agreement between two or more parties outlined in a formal document. It is not legally binding but signals the willingness of the parties to move forward with a contract.
CorrectIncorrect -
Question 3 of 14
3. Question
The ____________ is the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity.
CorrectIncorrect -
Question 4 of 14
4. Question
_________________ is a strategy that ensures continuity of operations with minimal service outage or downtime. It is designed to protect personnel or assets and make sure they can function quickly when a disaster strikes such as natural disasters or cyber-attacks.
CorrectIncorrect -
Question 5 of 14
5. Question
The _________________ is described as an estimated frequency of the threat occurring in one year.
CorrectIncorrect -
Question 6 of 14
6. Question
_________________ describes a period of time in which an enterprise’s operations must be restored following a disruptive event, e.g., a cyberattack, natural disaster, or communications failure.
CorrectIncorrect -
Question 7 of 14
7. Question
_________________ is the average time it takes to recover from a product or system failure. This includes the full time of the outage—from the time the system or product fails to the time that it becomes fully operational again.
CorrectIncorrect -
Question 8 of 14
8. Question
_________________ measures the predicted time that passes between one previous failure of a mechanical/electrical system to the next failure during normal operation. In simpler terms, it helps you predict how long an asset can run before the next unplanned breakdown happens.
CorrectIncorrect -
Question 9 of 14
9. Question
A ___________________ is a legally enforceable contract that establishes confidentiality between two parties—the owner of protected information and the recipient of that information.
CorrectIncorrect -
Question 10 of 14
10. Question
A/An _______________ is a contract between a service provider and its customers that documents what services the provider will furnish and defines the service standards the provider is obligated to meet.
CorrectIncorrect -
Question 11 of 14
11. Question
Which of the following type of contracts is designed to outline the requirements of confidential materials, knowledge, or information between two or more parties for a certain purpose?
CorrectIncorrect -
Question 12 of 14
12. Question
Which of the following categories would contain information that can be used to identify a specific individual such as social security numbers and phone numbers?
CorrectIncorrect -
Question 13 of 14
13. Question
A telecom company may promise network availability of 99.999 percent and allow the customer to reduce their payment by a given percentage if that is not achieved. Which of the following agreements is described in this example?
CorrectIncorrect -
Question 14 of 14
14. Question
An information system which is so critical to an organization that in case of corruption or loss of access to it would have a serious impact on the organization’s ability to conduct business is known as?
CorrectIncorrect