
Security Breaches
Authored by Josan Tamayo
Computers
University
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.
Physical theft/exposure
Phishing
Insider threat
Ransomware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Something as simple as including the wrong person in the Cc field of an email or attaching the wrong document to an email could cause a data breach.
Employee negligence/error
Cyber attack/criminal hacker
Unauthorised access
Physical theft/exposure
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It can come in various forms, including denial of service, malware and password attacks.
Employee negligence/error
Cyber attack/criminal hacker
Unauthorised access
Physical theft/exposure
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A breach of these controls means that someone has gained unauthorised access to sensitive data, such as bank details stored by HR, or potentially compromised business critical information.
Employee negligence/error
Cyber attack/criminal hacker
Unauthorised access
Physical theft/exposure
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This type of data breach can be caused by improper disposal of sensitive information, or simply leaving a confidential document in plain sight.
Employee negligence/error
Cyber attack/criminal hacker
Unauthorised access
Physical theft/exposure
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a type of malicious program that demands payment after launching a cyber attack on a computer system.
Ransomware
Cyber attack/criminal hacker
Unauthorised access
Physical theft/exposure
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.
insider threat
Cyber attack/criminal hacker
Unauthorised access
Physical theft/exposure
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Lesson 5 - Output Handling
Quiz
•
University
10 questions
cybercrime
Quiz
•
12th Grade - University
10 questions
Online scams
Quiz
•
University
10 questions
CHAPTER 3 - SECURITY BREACHES
Quiz
•
University
10 questions
IPS dan Security Software
Quiz
•
University
10 questions
Anime
Quiz
•
KG - University
10 questions
hacking
Quiz
•
University
11 questions
Scams and Schemes
Quiz
•
KG - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade