Search Header Logo

Unit 2, 6.2 Risks of breaches in information security

Authored by Paul De Ville Forte

Computers

10th - 12th Grade

Used 222+ times

Unit 2, 6.2 Risks of breaches in information security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This means access to data at any time by people who should not be able to see it

Unauthorized or unintended access to data

Accidental loss of data

Intentional destruction of data

Intentional tampering with data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This means the data has been lost, not just a copy but the original source

Unauthorized or unintended access to data

Accidental loss of data

Intentional destruction of data

Intentional tampering with data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is usually motivated by a desire to harm the organisation that holds the data.

Unauthorized or unintended access to data

Accidental loss of data

Intentional destruction of data

Intentional tampering with data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tampering with data means that the data is changed in somewhere but it still available.

Unauthorized or unintended access to data

Accidental loss of data

Intentional destruction of data

Intentional tampering with data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match the example;

Government espionage, A government breach may include the security of the country and potentially give an enemy country the advantage.

Unauthorized or unintended access to data

Accidental loss of data

Intentional destruction of data

Intentional tampering with data

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match the example;

Corporate espionage could give the competitor an advantage or damage their reputation

Unauthorized or unintended access to data

Accidental loss of data

Intentional destruction of data

Intentional tampering with data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Match the example;

Not training your staff to check the recipients of the emails before sending private and sensitive data or a member of staff leaving a print out of sensitive data in a public space.

Unauthorized or unintended access to data

Accidental loss of data

Intentional destruction of data

Intentional tampering with data

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?