
A1 Threat Types
Authored by Barry Wright
Computers
12th Grade
Used 11+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "is most commonly carried out by copying or removing personal data or confidential business information from a company's computers or electronic devices?"
Employee Actions
Data Theft
Accidental Loss
Unintentional disclosure or damage to data
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. This includes breaches that are the result of both accidental and deliberate causes?"
Employee Actions
Data Theft
Accidental Loss
Unintentional disclosure or damage to data
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What "happens when data is destroyed, corrupted, or made unreadable by software applications and users?"
Employee Actions
Data Theft
Accidental Loss
Unintentional disclosure or damage to data
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is “the process of destroying data stored on tapes, hard disks and other forms of electronic media so that it is completely unreadable and cannot be accessed or used for unauthorized purposes?"
Data Theft
Destruction of Data
Withholding/disruptions of systems
Users overriding Security Controls
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is “An unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time?"
Data Theft
Destruction of Data
Withholding/disruptions of systems
Users overriding Security Controls
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Natural events (floods), other environmental conditions (heavy rain, extreme temperatures), terrorist actions and other disasters are examples of what?
Internal Threats
External Threats
Physical Threats
Social Engineering and Software Driven threats
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What "refers to all techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons?"
Social Engineering
Software-driven Threats
Network-based Threats
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
emptech L1 A
Quiz
•
12th Grade
20 questions
ASPEK LEGAL TIK XII
Quiz
•
12th Grade
20 questions
Pengayaan Informatika
Quiz
•
12th Grade
12 questions
ASAS SAINS KOMPUTER : TINGKATAN 3
Quiz
•
4th Grade - University
12 questions
Effect of ICT
Quiz
•
9th - 12th Grade
20 questions
Online Platform Block Q
Quiz
•
11th - 12th Grade
20 questions
City & Guilds Award in Business Processes
Quiz
•
12th Grade
10 questions
PRE-ASSESSMENT ETECH M1
Quiz
•
12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade