Search Header Logo

Cyber standard

Authored by Akash Goel

Other

Professional Development

Used 1+ times

Cyber standard
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement accurately describes the relationship between The Data Protection Act 2018 and the GDPR?

The Data Protection Act 2018 is a completely separate legislation from the GDPR
The Data Protection Act 2018 and the GDPR are identical in their provisions
The Data Protection Act 2018 is the UK’s implementation of the GDPR.
The GDPR supersedes The Data Protection Act 2018 in all aspects.

Answer explanation

Definition

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of the NIS Directive?

To establish uniform data protection regulations across the EU.
To harmonize taxation policies among EU member states.
To enhance cybersecurity across the EU.
To regulate competition in the telecommunications industry.

Answer explanation

Definition

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of the EU's data protection law, commonly known as GDPR?

To promote unrestricted data sharing among businesses within the EU.
To impose minimal obligations on businesses regarding data handling practices.
To ensure that data related to individuals in the EU is protected and subject to strict conditions.
To encourage businesses to freely transfer and store data without constraints.

Answer explanation

Definition

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements accurately describes the protections provided by the Safe Harbour Policy?

It shields individuals from the consequences of negligent actions.
It doesnot protects individuals who act with care, skill, and diligence.
It offers protection to those who act in bad faith.
It requires individuals to have a conflict of interest to be eligible for protection.

Answer explanation

Definition

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What all Activites are not considered illegal

Unauthorized access to computer material. This refers to entering computer system without permission (Hacking).
authorized access to computer material
Unauthorized modification of data. This refers to modifying or deleting data, and also covers the introduction of malware or spyware onto a computer.
Making, supplying or obtaining anything which can be used in computer misuse offences.

Answer explanation

Definition

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is not the step to cybersecurity

User Education and Awareness
Incident Management
Malware Prevention
Conducting fraud

Answer explanation

Definition

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is not a cybersecurity standard

PCI-DSS
NIST Cybersecurity Framework
FCA Operational Resilience Expectations
KREST

Answer explanation

Definition

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?