Ethical Hacking Revision

Ethical Hacking Revision

9th Grade

20 Qs

quiz-placeholder

Similar activities

GCSE Computer Science - Legal

GCSE Computer Science - Legal

9th - 11th Grade

25 Qs

Computing Laws

Computing Laws

8th - 10th Grade

24 Qs

j2771.6 Legal Moral Ethical Environmental

j2771.6 Legal Moral Ethical Environmental

9th - 11th Grade

22 Qs

Ethical, Environmental, Cutural & Legal Impacts

Ethical, Environmental, Cutural & Legal Impacts

9th - 10th Grade

17 Qs

Unit1: Health Issues when using computers

Unit1: Health Issues when using computers

6th - 11th Grade

20 Qs

Freedom of Speech and the Internet

Freedom of Speech and the Internet

9th - 12th Grade

15 Qs

Entry Level - Moral, Legal & Environmental

Entry Level - Moral, Legal & Environmental

8th - 9th Grade

17 Qs

Network Security J277

Network Security J277

9th Grade

24 Qs

Ethical Hacking Revision

Ethical Hacking Revision

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Laura Sherrington

Used 353+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to someone who has a conviction?

Someone who has committed a crime

Someone who witnessed a crime

Someone who has been found guilty of a crime

Someone who is caught in the act of committing a crime

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Two CDs containing details of the last 500 employee sickness records has gone missing. These CD's were not encrypted.


Which one of the following laws has been broken?

Police and Justice Act

Computer Misuse Act

Regulation of Investigatory Powers Act

Data Protection Act

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is the name of the software that is designed to record every action which is typed with the aim of stealing sensitive data?

Trojan horse

Worm

Keylogger

Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following defines the various programs used to communicate instructions to a computer and connected devices

Operating system software

Hardware devices

Office application software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a password that consists of a combination of letters, both uppercase and lowercase, numbers and symbols is known as which of the following?

Secure password

Solid password

Keylogger password

Trojan password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does RIPA stand for?

Regulation of Investigatory Powers Act

Regulation of Information Powers Act

Regulation of Investigatory Protection Act

Recovery of Investigatory Powers Act

Recovery of Information Powers Act

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following laws prevents unlawful and authorised interception of electronic communication?

Regulation of Investigatory Powers Act

Regulation of Investigation Act

Regulator of Investigation Powers Act

Regulating of Investigations Act

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?