Search Header Logo
Data-level Protection

Data-level Protection

Assessment

Presentation

•

Computers

•

9th - 10th Grade

•

Practice Problem

•

Medium

Created by

Calum Gordon

Used 14+ times

FREE Resource

9 Slides • 22 Questions

1

Data-level Protection

Protecting computer systems from data loss

media

2

media

3

media

4

Multiple Select

Question image

In this lesson I am going to learn ... ?

1

How data is protected by encryption

2

How backup and recovery protects against data loss

3

How access control helps protect systems and data

4

How compression helps reduce the size of data

5

media

6

Multiple Choice

Most computer systems are concerned with the storage, processing and transfer of vast quantities of ______

1

data

2

information

3

bits

4

packets

7

media

8

Fill in the Blank

What is the process of converting data into an illegible, scrambled format so that it cannot be understood by unauthorised parties?

9

Multiple Choice

If data is accessed by an unauthorised person, how will encryption help with data security?

1

It will not be readable

2

It will not be accessible

3

It will not be traceable

4

It will not be copiable

10

Multiple Choice

Encryption provides some protection for computer systems against ________

1

hackers

2

malware

3

power failures

4

system errors

11

media

12

Multiple Choice

What is a "back-up" of data?

1

An identical copy of data that is stored in a separate location to the original

2

Data stored on an external storage device

3

An identical copy of data stored in the same location as the original

4

Saving data on a Cloud storage service

13

Multiple Select

Backups should be .... (choose all that apply)

1

incremental or full backups

2

kept for 30 days

3

scheduled

4

regular

5

stored in a safe place

14

Fill in the Blank

__________ is the process of using a back-up copy of data to restore a database or system to the correct state when a failure or data loss occurs.

15

Multiple Choice

Comparing incremental vs. full backup strategies ...

Which one is perfomed more frequently?

1

Incremental

2

Full

16

Multiple Choice

Comparing incremental vs. full backup strategies ...

Which one takes up more storage space?

1

Incremental

2

Full

17

Multiple Choice

Comparing incremental vs. full backup strategies ...

Which one takes longer to backup?

1

Incremental

2

Full

18

Multiple Choice

Comparing incremental vs. full backup strategies ...

Which one is more likely to be used for recovery purposes?

1

Incremental

2

Full

19

media

20

Multiple Choice

A type of data security where different users are allocated varying levels of access to data or systems?

1

Firewall

2

Access control

3

Social engineering

4

Anti-malware

21

Multiple Select

Choose all the different types of access permission a user may have to access data

1

read

2

write

3

amend / update

4

run / execute

5

no access

22

Multiple Select

A user has 'read' access to a file.

What file operations can be performed?

1

open

2

print

3

delete

4

save

23

Multiple Select

A user has 'write' access to a file.

What file operations can be performed?

1

open

2

run

3

delete

4

save

24

Multiple Select

A user has 'execute' access to a file.

What file operations can be performed?

1

open

2

run

3

copy

4

save

25

media

26

Fill in the Blank

__________ security is a means of providing added protection to data and systems outside of software by providing an extra layer of security around the actual environment of the company or organisation.

27

Multiple Select

Choose all the valid examples of physical security methods ...

1

Fingerprint scanner

2

Turning monitor screen away from window or door

3

Keypad PIN access to server room

4

CCTV

5

Keeping firewall rules updated

28

media

29

Multiple Select

Question image

In this lesson I have learned to ...

1

Explain how encryption protects data

2

Explain how backup/recovery protects data

3

Explain how access rights protects data

30

Open Ended

Question image

Thinking Hard

Reduce the key argument in today's lesson into exactly 12 words.

(press Shift+Enter to take a new line ...)

31

Poll

Question image

How much of this lesson have you understood?

None of it

Some of it

Most of it

All of it

Data-level Protection

Protecting computer systems from data loss

media

Show answer

Auto Play

Slide 1 / 31

SLIDE