
Cambridge Technical Unit 3 LO1
Authored by Jason Rivers
Computers
11th Grade
Used 119+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Phishing
Misleading individuals or organisation into parting with confidential and personal data to commit fraud
Looking at files, ports and locations to access, create, modify or delete files without permission
Malicious software that allows a backdoor entrance to a system or computer device
When data packets on the internet are intercepted and copied, edited or transferred to a new location
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Social Engineering
Listening into communication traffic such as email, IM, faxing or video-conferencing
Illegally removing copies of personal or company data form information systems
Manipulation of individuals to trick them into giving sensitive information
Looking at files, ports and locations to access, create, modify or delete files without permission
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Interception
Looking at files, ports and locations to access, create, modify or delete files without permission
When data packets on the internet are intercepted and copied, edited or transferred to a new location
Listening into communication traffic such as email, IM, faxing or video-conferencing
Illegally removing copies of personal or company data form information systems
4.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
What does CIA stand for in terms of cyber security (Only write the three terms)
(a)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Changing data, information, programs or documentation without permission.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Reading or reviewing data, information or systems documentation without permission of the appropriate owner or manager.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Activity intended to gain access to data, networks, systems, hardware or software without permission of the owner or other responsible individual/organisation.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?