Data Security Breach

Data Security Breach

University

33 Qs

quiz-placeholder

Similar activities

1. แนวปฏิบัติการสร้างความตระหนักเรื่องการรักษาความปลอดภัย

1. แนวปฏิบัติการสร้างความตระหนักเรื่องการรักษาความปลอดภัย

University

30 Qs

Kel 9 Tugas Etika Profesi Y7D

Kel 9 Tugas Etika Profesi Y7D

University

28 Qs

Analisis Butir Soal Kelas B

Analisis Butir Soal Kelas B

University

28 Qs

Programming Logic and Design - Chapter 4 - Making Decisions

Programming Logic and Design - Chapter 4 - Making Decisions

University - Professional Development

35 Qs

Internal Audit Quiz 2

Internal Audit Quiz 2

University

28 Qs

Algoritma dan Logika Informatika

Algoritma dan Logika Informatika

University

35 Qs

Bab 3-Sistem Komputer -Grade 5

Bab 3-Sistem Komputer -Grade 5

5th Grade - University

35 Qs

Almacenamiento y respaldo de la Información

Almacenamiento y respaldo de la Información

University

31 Qs

Data Security Breach

Data Security Breach

Assessment

Quiz

Instructional Technology, Education, Computers

University

Medium

Created by

Rik Weightman

Used 16+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The accuracy, reliability and consistency of data

Data integrity

Data security

Data archiving

Data entry

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person who uses computers to gain unauthorized access to data

Saboteur

Hacker

Fraudster

Criminal

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious program that attaches itself to an executable piece of software, and then reproduces itself when the file is run.

Worm

Trojan horse

Malware

Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Measures that are put in place to ensure data is safe

Data integrity

Data protection

Data security

Data authorisation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any act using computers/the Internet to defraud people

Computer fraud

Phising

Keylogging

Identity theft

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The illegal practice of monitoring/investigating another business for a competitive advantage

Electronic eavesdropping

Propaganda

Industrial espionage

Software piracy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An input device that identifies a person based on the individual’s characteristics/traits (fingerprint)

Biometric scan

Biological print

Electronic footprint

Retinal scan

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?