Cambridge Technicals Unit 3 Cybersecurity

Cambridge Technicals Unit 3 Cybersecurity

11th - 12th Grade

10 Qs

quiz-placeholder

Similar activities

BTEC DIT C3 LAA - Choosing Cloud Technologies

BTEC DIT C3 LAA - Choosing Cloud Technologies

10th - 11th Grade

10 Qs

Jakob Nielsen's 10 Usability Heuristics

Jakob Nielsen's 10 Usability Heuristics

10th Grade - University

10 Qs

Cambridge Technical Unit 3 LO1

Cambridge Technical Unit 3 LO1

11th Grade

10 Qs

1.8 Ethical, legal, cultural and environmental concerns

1.8 Ethical, legal, cultural and environmental concerns

10th - 11th Grade

14 Qs

Ethical, legal, cultural and environmental concerns: GCSE 9-1 Computer Science

Ethical, legal, cultural and environmental concerns: GCSE 9-1 Computer Science

9th - 12th Grade

15 Qs

System Life Cycle

System Life Cycle

10th - 11th Grade

10 Qs

Creative iMedia RO81 LO3 legal issues #2

Creative iMedia RO81 LO3 legal issues #2

9th - 11th Grade

15 Qs

Data Protection Act 1988

Data Protection Act 1988

6th - 12th Grade

12 Qs

Cambridge Technicals Unit 3 Cybersecurity

Cambridge Technicals Unit 3 Cybersecurity

Assessment

Quiz

Computers

11th - 12th Grade

Medium

Created by

Melanie Hopgood Hall

Used 68+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Unauthorised access is defined as....

Activity intended to gain access to data, networks, computer system hardware or software without the permission of the owner or other responsible individuals or organisation.

Reviewing or reading data, information or systems documentation without permission of the appropriate owner or manager.

Changing data, information, programs or documentation without permission.

Allowing information to pass to any person or organisation without permission.

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Unauthorised inspection is defined as.......

Activity intended to gain access to data, networks, computer system hardware or software without the permission of the owner or other responsible individuals or organisation.

Reviewing or reading data, information or systems documentation without permission of the appropriate owner or manager.

Changing data, information, programs or documentation without permission.

Allowing information to pass to any person or organisation without permission.

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Unauthorised modification is defined as........

Allowing information to pass to any person or organisation without permission.

Changing data, information, programs or documentation without permission.

Reviewing or reading data, information or systems documentation without permission of the appropriate owner or manager.

Activity intended to gain access to data, networks, computer system hardware or software without the permission of the owner or other responsible individuals or organisation.

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Unauthorised disclosure is defined as......

Activity intended to gain access to data, networks, computer system hardware or software without the permission of the owner or other responsible individuals or organisation.

Reviewing or reading data, information or systems documentation without permission of the appropriate owner or manager.

Changing data, information, programs or documentation without permission.

Allowing information to pass to any person or organisation without permission.

5.

FILL IN THE BLANK QUESTION

1 min • 5 pts

In CIA triad, A stands for...

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

The process by which criminals hide the origin of the proceeds of their crime by transferring the money through different bank accounts and countries to make it look as if it comes from a legal source.

Data mining

Money laundering

Fracking

Phishing

7.

FILL IN THE BLANK QUESTION

1 min • 5 pts

Someone without the technical expertise to create their own softwareor means of hacking into a computer system, but who uses software or scripts created by someone else to carry out hacking is known as a script ...................?

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?