
Cambridge Technicals Unit 3 Cybersecurity
Authored by Melanie Hopgood Hall
Computers
11th - 12th Grade
Used 74+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Unauthorised access is defined as....
Activity intended to gain access to data, networks, computer system hardware or software without the permission of the owner or other responsible individuals or organisation.
Reviewing or reading data, information or systems documentation without permission of the appropriate owner or manager.
Changing data, information, programs or documentation without permission.
Allowing information to pass to any person or organisation without permission.
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Unauthorised inspection is defined as.......
Activity intended to gain access to data, networks, computer system hardware or software without the permission of the owner or other responsible individuals or organisation.
Reviewing or reading data, information or systems documentation without permission of the appropriate owner or manager.
Changing data, information, programs or documentation without permission.
Allowing information to pass to any person or organisation without permission.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Unauthorised modification is defined as........
Allowing information to pass to any person or organisation without permission.
Changing data, information, programs or documentation without permission.
Reviewing or reading data, information or systems documentation without permission of the appropriate owner or manager.
Activity intended to gain access to data, networks, computer system hardware or software without the permission of the owner or other responsible individuals or organisation.
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Unauthorised disclosure is defined as......
Activity intended to gain access to data, networks, computer system hardware or software without the permission of the owner or other responsible individuals or organisation.
Reviewing or reading data, information or systems documentation without permission of the appropriate owner or manager.
Changing data, information, programs or documentation without permission.
Allowing information to pass to any person or organisation without permission.
5.
FILL IN THE BLANK QUESTION
1 min • 5 pts
In CIA triad, A stands for...
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
The process by which criminals hide the origin of the proceeds of their crime by transferring the money through different bank accounts and countries to make it look as if it comes from a legal source.
Data mining
Money laundering
Fracking
Phishing
7.
FILL IN THE BLANK QUESTION
1 min • 5 pts
Someone without the technical expertise to create their own softwareor means of hacking into a computer system, but who uses software or scripts created by someone else to carry out hacking is known as a script ...................?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?