ICDL/ECDL IT SECURITY QUIZ #1 - 2020

ICDL/ECDL IT SECURITY QUIZ #1 - 2020

Professional Development

31 Qs

quiz-placeholder

Similar activities

1-30 Quiz

1-30 Quiz

Professional Development

30 Qs

ASB MOD1

ASB MOD1

Professional Development

26 Qs

SAS 9B

SAS 9B

Professional Development

30 Qs

Introducing Windows 11

Introducing Windows 11

KG - Professional Development

26 Qs

A+ Core 1 - 1101 - Quiz 1

A+ Core 1 - 1101 - Quiz 1

Professional Development

32 Qs

ICDL IT SECURITY QUIZ #2 - 2025

ICDL IT SECURITY QUIZ #2 - 2025

Professional Development

30 Qs

minecraft ores

minecraft ores

KG - Professional Development

26 Qs

pc

pc

1st Grade - Professional Development

27 Qs

ICDL/ECDL IT SECURITY QUIZ #1 - 2020

ICDL/ECDL IT SECURITY QUIZ #1 - 2020

Assessment

Quiz

Professional Development

Medium

Created by

Tracy Treacher

Used 277+ times

FREE Resource

31 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following best describes the relationship between data & information?

Data & information are the same

Data is the raw input that information is based on

Information is unorganised data

Information is any data that is in digital form

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following best describes cybercrime?

Broadband connection with little or no access to the Internet

Theft of computers, smartphones or other devices.

Repeated failed attempts to log onto a PC

Illegal activities by means of computer networks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a possible threat to data?

Employees

Service Providers

Screen resolution

Trojans

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is an example of a threat to data from extraordinary circumstances?

Lost Password

Cracking

Fire

Cybercrime

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a typical threat to data from using Cloud Computing?

Shredding

Loss of privacy

Identity theft

Restricted access

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is a typical threat to data from using Cloud Computing?

Shredding

Loss of privacy

Identity theft

Restricted access

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

______________ is a characteristic of information security that ensures the non disclosure of data except to another authorised person.

Confidentiality

Accessability

Intergrity

Availability

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?