Unit 3 Session 1.2

Unit 3 Session 1.2

3rd - 12th Grade

23 Qs

quiz-placeholder

Similar activities

Ethical Hacking Revision

Ethical Hacking Revision

9th Grade

20 Qs

GCSE J277 - 1.4.1 - Network Threats

GCSE J277 - 1.4.1 - Network Threats

7th Grade

20 Qs

1.10 Computer Misuse Act & Cyber Crime

1.10 Computer Misuse Act & Cyber Crime

10th Grade

20 Qs

GCSE AQA CS - 06 Cyber Security

GCSE AQA CS - 06 Cyber Security

10th - 11th Grade

18 Qs

BTEC Tech Award DIT - Threats, Prevention, Policy (Complete)

BTEC Tech Award DIT - Threats, Prevention, Policy (Complete)

9th - 10th Grade

26 Qs

Data Protection Act & Computer Misuse Act

Data Protection Act & Computer Misuse Act

11th Grade

18 Qs

BTEC IT Unit 1 - F - Laws

BTEC IT Unit 1 - F - Laws

10th - 12th Grade

20 Qs

UK Computer Laws

UK Computer Laws

10th - 12th Grade

20 Qs

Unit 3 Session 1.2

Unit 3 Session 1.2

Assessment

Quiz

Computers

3rd - 12th Grade

Medium

Created by

Richard Love

Used 2+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Activity intended to gain access to data, networks, hardware or software without permission is called what?

Unauthorised Access

Authorised Access

Confidentiality

Integrity

2.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Reviewing or reading data without permission is called what?

Unauthorised disclosure

Unauthorised collaboration

Unauthorised modification

Unauthorised inspection

3.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Changing data without permission is called what?

Unauthorised disclosure

Unauthorised collaboration

Unauthorised modification

Unauthorised inspection

4.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Passing data to others without permission is called what?

Unauthorised disclosure

Unauthorised collaboration

Unauthorised modification

Unauthorised inspection

5.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Unauthorised access refers not just to gaining access to data without permission but also carrying out activities with the data.

True

False

6.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

Unauthorised access refers just to gaining access to data without permission it does not necessarily imply also carrying out activities with the data.

True

False

7.

MULTIPLE CHOICE QUESTION

1 min • 5 pts

Gaining access to a system through any means other than using a legitimate username and password is called what?

Hacking

Vertical escalation of privileges

Horizontal escalation of privileges

Encryption

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?