R050: TA04 Cybersecurity and legislation

R050: TA04 Cybersecurity and legislation

11th Grade

38 Qs

quiz-placeholder

Similar activities

KUIS TKJ KE-1

KUIS TKJ KE-1

1st Grade - University

40 Qs

Sistemas de Archivos: operaciones

Sistemas de Archivos: operaciones

11th Grade

40 Qs

Grade 6-Sistem Komputer

Grade 6-Sistem Komputer

6th Grade - University

40 Qs

98-368 Mobility and Devices Fundamentals Study Guide

98-368 Mobility and Devices Fundamentals Study Guide

9th - 12th Grade

40 Qs

GIỮA KỲ 2 -  TIN 8

GIỮA KỲ 2 - TIN 8

8th Grade - University

36 Qs

HOJAS DE CÁLCULO SPS (2)

HOJAS DE CÁLCULO SPS (2)

11th Grade

36 Qs

PowerPoint  2016

PowerPoint 2016

7th Grade - University

40 Qs

ms access

ms access

11th Grade

33 Qs

R050: TA04 Cybersecurity and legislation

R050: TA04 Cybersecurity and legislation

Assessment

Quiz

Computers

11th Grade

Hard

Created by

David Anderson

Used 33+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

38 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What does DoS stand for?

Disk Operating System

Denial of Service

Data over Sound

Document Object System

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is a black hat hacker?

A person who hacks into a computer network with malicious intent

A person who protects computer networks from intrusions

A person who hacks into a computer network to find vulnerabilities

A person who legally breaks into computers to test their security

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Why is a Trojan horse used?

To perform malicious tasks without the user's knowledge

To protect computers from viruses

To enhance the performance of a computer

To encrypt files for security

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

How does phishing attempt to get financial details from a user?

By sending legitimate-looking emails that request financial information

By physically stealing the user's wallet

By asking for financial details over a phone call

By hacking into the user's bank account directly

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Identify two types of social engineering.

Phishing and Spear Phishing

Tailgating and Baiting

Pretexting and Quizzes

Phishing and Tailgating

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is meant by data destruction?

Erasing data so it can be reused

Physically destroying the storage device

Removing data from a database without traces

Permanently destroying data so it cannot be recovered

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the difference between data at rest and data in transit?

Data at rest is encrypted data stored, while data in transit is data being transferred over a network.

Data at rest refers to data being actively used in devices, while data in transit is stored data.

There is no difference; both terms refer to data stored on a hard drive.

Data at rest is data being transferred over a network, while data in transit is encrypted data stored.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?