Cambridge Technical Unit 3 LO1

Cambridge Technical Unit 3 LO1

11th Grade

10 Qs

quiz-placeholder

Similar activities

Ben - 31/01/17 - Misuse act

Ben - 31/01/17 - Misuse act

11th Grade

12 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Software - Common Utility Programs

Software - Common Utility Programs

3rd - 12th Grade

10 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

Computing Legislation A-Level CS

Computing Legislation A-Level CS

10th Grade - University

10 Qs

BTEC DIT: Revision 1-6

BTEC DIT: Revision 1-6

1st - 12th Grade

11 Qs

Computers and UK Law KS4

Computers and UK Law KS4

7th - 11th Grade

10 Qs

BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

10th - 11th Grade

10 Qs

Cambridge Technical Unit 3 LO1

Cambridge Technical Unit 3 LO1

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Jason Rivers

Used 115+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Definition of Phishing

Misleading individuals or organisation into parting with confidential and personal data to commit fraud

Looking at files, ports and locations to access, create, modify or delete files without permission

Malicious software that allows a backdoor entrance to a system or computer device

When data packets on the internet are intercepted and copied, edited or transferred to a new location

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Definition of Social Engineering

Listening into communication traffic such as email, IM, faxing or video-conferencing

Illegally removing copies of personal or company data form information systems

Manipulation of individuals to trick them into giving sensitive information

Looking at files, ports and locations to access, create, modify or delete files without permission

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Definition of Interception

Looking at files, ports and locations to access, create, modify or delete files without permission

When data packets on the internet are intercepted and copied, edited or transferred to a new location

Listening into communication traffic such as email, IM, faxing or video-conferencing

Illegally removing copies of personal or company data form information systems

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What does CIA stand for in terms of cyber security (Only write the three terms)

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term matches this definition


Changing data, information, programs or documentation without permission.

Unauthorised Access

Unauthorised Inspection

Unauthorised Modification

Unauthorised Disclosure

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term matches this definition


Reading or reviewing data, information or systems documentation without permission of the appropriate owner or manager.

Unauthorised Access

Unauthorised Inspection

Unauthorised Modification

Unauthorised Disclosure

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term matches this definition


Activity intended to gain access to data, networks, systems, hardware or software without permission of the owner or other responsible individual/organisation.

Unauthorised Access

Unauthorised Inspection

Unauthorised Modification

Unauthorised Disclosure

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?