Cambridge Technical Unit 3 LO1

Quiz
•
Computers
•
11th Grade
•
Hard

Jason Rivers
Used 117+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Phishing
Misleading individuals or organisation into parting with confidential and personal data to commit fraud
Looking at files, ports and locations to access, create, modify or delete files without permission
Malicious software that allows a backdoor entrance to a system or computer device
When data packets on the internet are intercepted and copied, edited or transferred to a new location
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Social Engineering
Listening into communication traffic such as email, IM, faxing or video-conferencing
Illegally removing copies of personal or company data form information systems
Manipulation of individuals to trick them into giving sensitive information
Looking at files, ports and locations to access, create, modify or delete files without permission
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Interception
Looking at files, ports and locations to access, create, modify or delete files without permission
When data packets on the internet are intercepted and copied, edited or transferred to a new location
Listening into communication traffic such as email, IM, faxing or video-conferencing
Illegally removing copies of personal or company data form information systems
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What does CIA stand for in terms of cyber security (Only write the three terms)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Changing data, information, programs or documentation without permission.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Reading or reviewing data, information or systems documentation without permission of the appropriate owner or manager.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Activity intended to gain access to data, networks, systems, hardware or software without permission of the owner or other responsible individual/organisation.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Unit 1.3 Wired and Wireless Networks MCQ1

Quiz
•
7th - 11th Grade
15 questions
Online communities & cloud computing - BTEC IT unit 1

Quiz
•
11th - 12th Grade
11 questions
BTEC DIT: Revision 1-6

Quiz
•
1st - 12th Grade
10 questions
BTEC DIT C3 LAB - Why Systems Are Attacked

Quiz
•
10th - 11th Grade
10 questions
4.4 Prevention methods

Quiz
•
9th - 11th Grade
10 questions
Software - Common Utility Programs

Quiz
•
3rd - 12th Grade
14 questions
WJEC ICT - Chapter 1 - Cloud Storage

Quiz
•
10th Grade - University
10 questions
BTEC DIT C3 LAB - Data Level Protection 1

Quiz
•
10th - 11th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade