
Unit 2, 6.2 Risks of breaches in information security
Authored by Paul De Ville Forte
Computers
10th - 12th Grade
Used 222+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
24 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This means access to data at any time by people who should not be able to see it
Unauthorized or unintended access to data
Accidental loss of data
Intentional destruction of data
Intentional tampering with data
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This means the data has been lost, not just a copy but the original source
Unauthorized or unintended access to data
Accidental loss of data
Intentional destruction of data
Intentional tampering with data
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This is usually motivated by a desire to harm the organisation that holds the data.
Unauthorized or unintended access to data
Accidental loss of data
Intentional destruction of data
Intentional tampering with data
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tampering with data means that the data is changed in somewhere but it still available.
Unauthorized or unintended access to data
Accidental loss of data
Intentional destruction of data
Intentional tampering with data
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match the example;
Government espionage, A government breach may include the security of the country and potentially give an enemy country the advantage.
Unauthorized or unintended access to data
Accidental loss of data
Intentional destruction of data
Intentional tampering with data
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match the example;
Corporate espionage could give the competitor an advantage or damage their reputation
Unauthorized or unintended access to data
Accidental loss of data
Intentional destruction of data
Intentional tampering with data
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Match the example;
Not training your staff to check the recipients of the emails before sending private and sensitive data or a member of staff leaving a print out of sensitive data in a public space.
Unauthorized or unintended access to data
Accidental loss of data
Intentional destruction of data
Intentional tampering with data
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?