Search Header Logo

Examiner's Reports Quiz

Authored by Shay Hillen

Instructional Technology

12th Grade

Examiner's Reports Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the type of attacker who 'uses computers and information technology to cause severe disruption or widespread fear in society.'

Hackers

Cyber terrorists

Phishers

Spammers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One type of cyber security incident is data modification. Identify two other types of cyber security incident.

Data Manipulation and Data Theft

Data Modification and Data Theft

Data Theft and Data Destruction

Data Manipulation and Data Modification

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data and information are targets for a cyber security attack. Identify two other targets for a cyber security attack.

Individuals and Network Equipment

Network Equipment and Data

Individuals and Data

Information and Organisation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by a secure back-up of data?

Taking a copy of the data at a given point in time

Deleting the original data after copying

Sharing the data with others

Storing the data on the same device

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do users need to agree to an acceptable use policy (AUP) when creating an account?

To be aware of the rules of using the website

To allow unrestricted access to all features

To avoid reading any terms and conditions

To automatically share personal data with others

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an account is created, what type of threat do user names and passwords try to stop?

Phishing

Unauthorised access/hacking

Malware infection

Data corruption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by identity theft?

Accessing a computer without permission

Pretending to be someone else to gain access to personal details

Sending spam emails

Installing malicious software

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?