Search Header Logo

A1 Threat Types

Authored by Barry Wright

Computers

12th Grade

Used 11+ times

A1 Threat Types
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "is most commonly carried out by copying or removing personal data or confidential business information from a company's computers or electronic devices?"

Employee Actions

Data Theft

Accidental Loss

Unintentional disclosure or damage to data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. This includes breaches that are the result of both accidental and deliberate causes?"

Employee Actions

Data Theft

Accidental Loss

Unintentional disclosure or damage to data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What "happens when data is destroyed, corrupted, or made unreadable by software applications and users?"

Employee Actions

Data Theft

Accidental Loss

Unintentional disclosure or damage to data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is “the process of destroying data stored on tapes, hard disks and other forms of electronic media so that it is completely unreadable and cannot be accessed or used for unauthorized purposes?"

Data Theft

Destruction of Data

Withholding/disruptions of systems

Users overriding Security Controls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is “An unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time?"

Data Theft

Destruction of Data

Withholding/disruptions of systems

Users overriding Security Controls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Natural events (floods), other environmental conditions (heavy rain, extreme temperatures), terrorist actions and other disasters are examples of what?

Internal Threats

External Threats

Physical Threats

Social Engineering and Software Driven threats

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What "refers to all techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons?"

Social Engineering

Software-driven Threats

Network-based Threats

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?