Examiner's Reports Quiz

Examiner's Reports Quiz

12th Grade

22 Qs

quiz-placeholder

Similar activities

Lesson 6.1 - 6.5

Lesson 6.1 - 6.5

8th Grade - University

20 Qs

Astudia Educational Workshop- GST and GIS

Astudia Educational Workshop- GST and GIS

6th Grade - University

21 Qs

Intro to Python Project Stem Unit 11 Test

Intro to Python Project Stem Unit 11 Test

9th - 12th Grade

20 Qs

CSP Unit 2 Study

CSP Unit 2 Study

9th - 12th Grade

19 Qs

CPA JYSS 2018 Prelims Paper 1

CPA JYSS 2018 Prelims Paper 1

7th Grade - Professional Development

20 Qs

network+ 16 practice

network+ 16 practice

12th Grade

25 Qs

Plan maintenance and/or diagnosis of faults in line with job

Plan maintenance and/or diagnosis of faults in line with job

12th Grade

20 Qs

CPA 4NT Paper 1 Quiz 1

CPA 4NT Paper 1 Quiz 1

10th - 12th Grade

20 Qs

Examiner's Reports Quiz

Examiner's Reports Quiz

Assessment

Quiz

Instructional Technology

12th Grade

Hard

Created by

Shay Hillen

FREE Resource

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the type of attacker who 'uses computers and information technology to cause severe disruption or widespread fear in society.'

Hackers

Cyber terrorists

Phishers

Spammers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One type of cyber security incident is data modification. Identify two other types of cyber security incident.

Data Manipulation and Data Theft

Data Modification and Data Theft

Data Theft and Data Destruction

Data Manipulation and Data Modification

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data and information are targets for a cyber security attack. Identify two other targets for a cyber security attack.

Individuals and Network Equipment

Network Equipment and Data

Individuals and Data

Information and Organisation

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by a secure back-up of data?

Taking a copy of the data at a given point in time

Deleting the original data after copying

Sharing the data with others

Storing the data on the same device

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do users need to agree to an acceptable use policy (AUP) when creating an account?

To be aware of the rules of using the website

To allow unrestricted access to all features

To avoid reading any terms and conditions

To automatically share personal data with others

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an account is created, what type of threat do user names and passwords try to stop?

Phishing

Unauthorised access/hacking

Malware infection

Data corruption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by identity theft?

Accessing a computer without permission

Pretending to be someone else to gain access to personal details

Sending spam emails

Installing malicious software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?