Back to Course
Data Protection in the IT Department
0% Complete
0/0 Steps
-
Introduction IT Security1 Topic
-
Protection Goals4 Topics|1 Quiz
-
Encryption and Signature3 Topics|1 Quiz
-
Deletion of Data1 Topic|1 Quiz
-
IT-Forensics1 Topic|1 Quiz
-
Safety in the Network4 Topics|1 Quiz
-
Attack Scenarios2 Topics|1 Quiz
-
IT Security in the Overall Concept3 Topics|1 Quiz
-
Cloud Computing1 Topic|1 Quiz
-
IT Security Act and IT Communication2 Topics|1 Quiz
Time limit: 0
Quiz Summary
0 of 2 Fragen completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Quiz complete. Results are being recorded.
Results
0 of 2 Fragen answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
-
Please repeat the quiz.
-
Congratulations! You have passed this quiz.
- 1
- 2
- Current
- Review
- Answered
- Correct
- Incorrect
-
Frage 1 of 2
1. Question
Please complete the following sentence:
-
IT forensics is the strictly methodical carried out on data carriers and in computer networks to clarify incidents.
CorrectIncorrect -
-
Frage 2 of 2
2. Question
Which tasks does IT forensics have, among others?
CorrectIncorrect