
ICDL | CYBER SECURITY
Authored by Marlinda rof
Computers
12th Grade
Used 47+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
62 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
..................... is a characteristic of information security that ensures the nondisclosure of data except to another authorized person.
Confidentiality.
Accessibility.
Integrity.
Availability
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following best describes why you should protect your personal information?
To prevent computer virus attacks.
To protect the computer from degaussing the hard drive.
To reduce the risk of identity theft.
To avoid losing backed up data files.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is a characteristic of anti-virus software?
It stores. important passwords. safely.
It alerts at any unauthorized firewall intrusion.
It prevents fraudulent users from logging on.
It scans the computer for malware.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is an example of a threat to data from extraordinary circumstances?
Lost password.
Cracking.
Fire.
Cyber crime
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following best describes a data subject?
An organisation who posts entries to social networking sites.
An individual who provides their personal data to a data controller.
An individual who carries out data processing
An organisation who encrypts data without a user's consent.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following best describes cybercrime?
Broadband connection with little or no access to the Internet.
Theft of computers, smartphones or other devices.
Repeated failed attempts to log on to a computer.
Illegal activities by means of computer networks.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following is NOT a possible threat to data
Employees.
Service providers.
Screen resolution.
Trojans.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?