R050: TA04 Cybersecurity and legislation

R050: TA04 Cybersecurity and legislation

11th Grade

38 Qs

quiz-placeholder

Similar activities

OCR Cambridge National ICT LO3

OCR Cambridge National ICT LO3

KG - Professional Development

34 Qs

Unit 1 - Nature and Methods of Science

Unit 1 - Nature and Methods of Science

9th - 12th Grade

35 Qs

Eduqas ICT - Mr Schofield

Eduqas ICT - Mr Schofield

9th - 12th Grade

35 Qs

Spreadsheets

Spreadsheets

KG - University

36 Qs

Computer Hardware, Software & Peripherals

Computer Hardware, Software & Peripherals

9th - 12th Grade

40 Qs

CompTIA Fundamentals Topic 1

CompTIA Fundamentals Topic 1

10th - 12th Grade

36 Qs

Excel/Access 1

Excel/Access 1

9th - 12th Grade

33 Qs

Cambridge Technical in IT Unit 2 LO2

Cambridge Technical in IT Unit 2 LO2

11th Grade

40 Qs

R050: TA04 Cybersecurity and legislation

R050: TA04 Cybersecurity and legislation

Assessment

Quiz

Computers

11th Grade

Hard

Created by

David Anderson

Used 32+ times

FREE Resource

38 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What does DoS stand for?

Disk Operating System

Denial of Service

Data over Sound

Document Object System

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is a black hat hacker?

A person who hacks into a computer network with malicious intent

A person who protects computer networks from intrusions

A person who hacks into a computer network to find vulnerabilities

A person who legally breaks into computers to test their security

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Why is a Trojan horse used?

To perform malicious tasks without the user's knowledge

To protect computers from viruses

To enhance the performance of a computer

To encrypt files for security

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

How does phishing attempt to get financial details from a user?

By sending legitimate-looking emails that request financial information

By physically stealing the user's wallet

By asking for financial details over a phone call

By hacking into the user's bank account directly

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Identify two types of social engineering.

Phishing and Spear Phishing

Tailgating and Baiting

Pretexting and Quizzes

Phishing and Tailgating

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is meant by data destruction?

Erasing data so it can be reused

Physically destroying the storage device

Removing data from a database without traces

Permanently destroying data so it cannot be recovered

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the difference between data at rest and data in transit?

Data at rest is encrypted data stored, while data in transit is data being transferred over a network.

Data at rest refers to data being actively used in devices, while data in transit is stored data.

There is no difference; both terms refer to data stored on a hard drive.

Data at rest is data being transferred over a network, while data in transit is encrypted data stored.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?