
Data Security and Risk Management

Interactive Video
•

Ethan Morris
•
Computers, Business, Professional Development
•
9th - 12th Grade
•
Hard
08:47
10 questions
Show all answers
1.
MULTIPLE CHOICE
30 sec • 1 pt
What are the two main components that usually make up a high-risk scenario?
2.
MULTIPLE CHOICE
30 sec • 1 pt
What is a risk matrix used for?
3.
MULTIPLE CHOICE
30 sec • 1 pt
What does unauthorized access to data typically involve?
4.
MULTIPLE CHOICE
30 sec • 1 pt
What is espionage in the context of information security?
5.
MULTIPLE CHOICE
30 sec • 1 pt
What can cause unintended access to data?
6.
MULTIPLE CHOICE
30 sec • 1 pt
What is the main difference between data access and data loss?
7.
MULTIPLE CHOICE
30 sec • 1 pt
What is an example of intentional destruction of data?
8.
MULTIPLE CHOICE
30 sec • 1 pt
Why might an attacker intentionally destroy data?
9.
MULTIPLE CHOICE
30 sec • 1 pt
What does intentional tampering of data involve?
10.
MULTIPLE CHOICE
30 sec • 1 pt
Which principle is most affected by data tampering?
Explore all questions with a free account
Find a similar activity
Create activity tailored to your needs using
CompTIA Security+ Certification SY0-601: The Total Course - Risk Management Concepts

•
University
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk Management - Identification

•
University
Temasek CIO Says Geopolitics Is a Major Risk to Investment

•
University
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - Risk Management - Assessment Part

•
University
CompTIA Security+ Certification SY0-601: The Total Course - Securing the Cloud

•
University
Morgan Stanley: Diversity Is Venture Capital’s Trillion Dollar Blind Spot

•
University
Cybersecurity Risks and Prevention Strategies

•
9th - 12th Grade
CompTIA Security+ Certification SY0-601: The Total Course - Third-Party Risk Management

•
University