The fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.

Security Breaches

Quiz
•
Computers
•
University
•
Hard
Josan Tamayo
Used 8+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Physical theft/exposure
Phishing
Insider threat
Ransomware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Something as simple as including the wrong person in the Cc field of an email or attaching the wrong document to an email could cause a data breach.
Employee negligence/error
Cyber attack/criminal hacker
Unauthorised access
Physical theft/exposure
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It can come in various forms, including denial of service, malware and password attacks.
Employee negligence/error
Cyber attack/criminal hacker
Unauthorised access
Physical theft/exposure
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A breach of these controls means that someone has gained unauthorised access to sensitive data, such as bank details stored by HR, or potentially compromised business critical information.
Employee negligence/error
Cyber attack/criminal hacker
Unauthorised access
Physical theft/exposure
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This type of data breach can be caused by improper disposal of sensitive information, or simply leaving a confidential document in plain sight.
Employee negligence/error
Cyber attack/criminal hacker
Unauthorised access
Physical theft/exposure
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a type of malicious program that demands payment after launching a cyber attack on a computer system.
Ransomware
Cyber attack/criminal hacker
Unauthorised access
Physical theft/exposure
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.
insider threat
Cyber attack/criminal hacker
Unauthorised access
Physical theft/exposure
Similar Resources on Quizizz
10 questions
Computer Technology

Quiz
•
University
10 questions
Cyber IT Act: Online Fraud Prevention

Quiz
•
University
10 questions
cyber security workshop

Quiz
•
University
10 questions
Pengantar Sistem & Teknologi Informasi (Materi 14 - 15)

Quiz
•
University
11 questions
Terminologi Keamanan Jaringan

Quiz
•
University
10 questions
OS Essentials - Chapter 14 (The IT Professional)

Quiz
•
KG - University
12 questions
Digital Forensics SQA

Quiz
•
University
10 questions
Cybercrime

Quiz
•
University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade