2023 Cyber Security Test

2023 Cyber Security Test

Professional Development

20 Qs

quiz-placeholder

Similar activities

Kuis Seputar belajar.id

Kuis Seputar belajar.id

Professional Development

15 Qs

Cyber Security Awareness

Cyber Security Awareness

Professional Development

15 Qs

....

....

Professional Development

25 Qs

Final Examination

Final Examination

Professional Development

20 Qs

TECHNOLOGY

TECHNOLOGY

Professional Development

21 Qs

Get to Know Tutoronomy Education Centres

Get to Know Tutoronomy Education Centres

Professional Development

16 Qs

My JOURNALISM

My JOURNALISM

1st Grade - Professional Development

18 Qs

Quiz 1 Peng SIBER_Diklapa 1 Armed

Quiz 1 Peng SIBER_Diklapa 1 Armed

Professional Development

20 Qs

2023 Cyber Security Test

2023 Cyber Security Test

Assessment

Quiz

Education

Professional Development

Medium

Created by

Mohammed Mirza

Used 98+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data Theft is one type of cyber security incident. Identify one other type of incident.

Data Plan

Data save

Data available

Data destruction

Answer explanation

Data theft is a type of cyber security incident. Another type of incident is data destruction, which involves intentionally deleting or damaging data.

2.

MULTIPLE SELECT QUESTION

1 min • 2 pts

A cyber criminal is an example of an attacker. Identify two other types of attackers.

Gardener

Cyber terrorist

Hater

Scammer

Answer explanation

A cyber criminal is an attacker. Other types of attackers include cyber terrorists and scammers. They engage in illegal activities online to cause harm or gain personal benefits.

3.

MULTIPLE SELECT QUESTION

1 min • 2 pts

One purpose of Cybersecurity is to maintain the availability of information and data. Identify two other purposes of Cybersecurity.

Confidentiality

Integrity

Nitigrity

Inferiority

Answer explanation

Cybersecurity also aims to ensure confidentiality and integrity of information and data, in addition to maintaining availability. Confidentiality protects against unauthorized access, while integrity ensures data remains unaltered and accurate.

4.

MULTIPLE SELECT QUESTION

2 mins • 2 pts

An online shop delivers boxes of fruit and vegetables, which customers can order online through the website. Customers input their contact and payment details into a form on the website.

Cybercriminals attacked the website and gained access to stored customer information. Explain what cybercriminals mean.

People who look after the elderly

People who steal data and information.

People who have money

People that destroy, disrupt, or misuse stolen data.

Answer explanation

Cybercriminals are individuals who steal and misuse data, causing destruction and disruption.

5.

MULTIPLE SELECT QUESTION

2 mins • 2 pts

An online shop delivers boxes of fruit and vegetables, which customers can order online through the website. Customers input their contact and payment details into a form on the website. Cybercriminals have attacked the website and gained access to the stored customer information.

Identify two possible motivations of the cybercriminals who attacked the website.

Publicity

Fraud

Financial gain

Pay utilities

Answer explanation

The cybercriminals may have attacked the website for publicity and financial gain. They could exploit the stolen customer information for personal gain or to gain attention.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An online shop delivers boxes of fruit and veg which customers can order online thru the website. Customers input contact and payment details into a form on the website. Cybercriminals attacked the website and have access to stored customer information.

Identify the legislation that was broken during the cyber security attack

Computer misuse Act 1990

Data protection Act 1998

GDPR 2018

Counterfeiting Act 2000

Answer explanation

The legislation that was broken during the cyber security attack is the Computer Misuse Act 1990. This act prohibits unauthorized access to computer systems, which the cybercriminals violated.

7.

MULTIPLE SELECT QUESTION

1 min • 6 pts

After the attack, the shop noticed that the images on the website had changed. Advertisements also appeared on the website's home page.

Identify and describe two ways in which these changes could have been made by the attacker.

Modification

Manipulation

Man in the middle

Malware

Answer explanation

The attacker could have made changes to the website through modification or manipulation, resulting in altered images and advertisements on the home page.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?