Search Header Logo

Security Breaches

Authored by Josan Tamayo

Computers

University

Used 8+ times

Security Breaches
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication.

Physical theft/exposure

Phishing

Insider threat

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Something as simple as including the wrong person in the Cc field of an email or attaching the wrong document to an email could cause a data breach.

Employee negligence/error

Cyber attack/criminal hacker

Unauthorised access

Physical theft/exposure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It can come in various forms, including denial of service, malware and password attacks.

Employee negligence/error

Cyber attack/criminal hacker

Unauthorised access

Physical theft/exposure

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A breach of these controls means that someone has gained unauthorised access to sensitive data, such as bank details stored by HR, or potentially compromised business critical information.

Employee negligence/error

Cyber attack/criminal hacker

Unauthorised access

Physical theft/exposure

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of data breach can be caused by improper disposal of sensitive information, or simply leaving a confidential document in plain sight.

Employee negligence/error

Cyber attack/criminal hacker

Unauthorised access

Physical theft/exposure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a type of malicious program that demands payment after launching a cyber attack on a computer system.

Ransomware

Cyber attack/criminal hacker

Unauthorised access

Physical theft/exposure

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security practices, data and computer systems.

insider threat

Cyber attack/criminal hacker

Unauthorised access

Physical theft/exposure

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers