Data Security Breach

Data Security Breach

University

•

33 Qs

quiz-placeholder

Similar activities

Bridge Course - Screening Test

Bridge Course - Screening Test

10th Grade - Professional Development

•

30 Qs

Freehand and Digital Drawing Midterm Exam 2021-2022

Freehand and Digital Drawing Midterm Exam 2021-2022

University

•

30 Qs

UJIAN MID SEMESTER 1 X RPL SISTEM KOMPUTER

UJIAN MID SEMESTER 1 X RPL SISTEM KOMPUTER

University

•

35 Qs

DIGITAL CITIZENSHIP

DIGITAL CITIZENSHIP

University

•

35 Qs

Lesson 4 - CMS: How it works?

Lesson 4 - CMS: How it works?

University

•

28 Qs

3D School Store Lessons 1 - 6 Quiz

3D School Store Lessons 1 - 6 Quiz

7th Grade - University

•

30 Qs

Examen AIP Simulacro

Examen AIP Simulacro

University

•

30 Qs

sistem enterprise

sistem enterprise

University

•

29 Qs

Data Security Breach

Data Security Breach

Assessment

Quiz

•

Instructional Technology, Education, Computers

•

University

•

Medium

Created by

Rik Weightman

Used 16+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

33 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The accuracy, reliability and consistency of data

Data integrity

Data security

Data archiving

Data entry

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person who uses computers to gain unauthorized access to data

Saboteur

Hacker

Fraudster

Criminal

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious program that attaches itself to an executable piece of software, and then reproduces itself when the file is run.

Worm

Trojan horse

Malware

Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Measures that are put in place to ensure data is safe

Data integrity

Data protection

Data security

Data authorisation

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any act using computers/the Internet to defraud people

Computer fraud

Phising

Keylogging

Identity theft

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The illegal practice of monitoring/investigating another business for a competitive advantage

Electronic eavesdropping

Propaganda

Industrial espionage

Software piracy

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An input device that identifies a person based on the individual’s characteristics/traits (fingerprint)

Biometric scan

Biological print

Electronic footprint

Retinal scan

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?