Terms in cyber security

Terms in cyber security

12th Grade

6 Qs

quiz-placeholder

Similar activities

Computer Problem Solving

Computer Problem Solving

9th Grade - Professional Development

10 Qs

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

10th Grade - University

11 Qs

computer networking -2

computer networking -2

12th Grade

10 Qs

IT ENGLISH: COMPTIA #13

IT ENGLISH: COMPTIA #13

12th Grade

11 Qs

Sistem Komputer kelas 8

Sistem Komputer kelas 8

9th - 12th Grade

10 Qs

coba quizizz

coba quizizz

10th - 12th Grade

10 Qs

Cyber Security TED Talk

Cyber Security TED Talk

12th Grade

7 Qs

Securing Windows

Securing Windows

9th Grade - University

10 Qs

Terms in cyber security

Terms in cyber security

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Razan Alghamdi undefined

Used 6+ times

FREE Resource

6 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

requiring multiple forms of verification

Multi-Factor Authentication

granting access to resources

Authorization

ensuring data has not been altered

Encryption

verifying a user's identity

Data Integrity

transforming data into a secure format

Authentication

2.

DRAG AND DROP QUESTION

1 min • 1 pt

The ​ (a)   can use​ ​ (b)   or​ ​ (c)   to attack your system

hacker
viruses
worms
firewall
antivirus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Back up your device means

Creating a copy of your device's data.
Transferring data to another device.
Updating your device's software.
Deleting all data from your device.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data Breach is

A data breach is an incident where unauthorized access to sensitive data occurs.
A data breach is a legal term for data storage.
A data breach is a type of software update.
A data breach is a method of data encryption.

5.

MATCH QUESTION

1 min • 1 pt

Match the following

a form of social engineering attack

Virtual Private Network

computing services from remote servers

Cloud Computing

Software designed to disrupt, damage, or gain unauthorized access to computer systems

Phishing

A security system that monitors and controls incoming and outgoing network traffic

Malware

a protected network connection

Firewall

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Risk Assessment is

the method of calculating financial returns.
a technique for improving employee performance.
the process of identifying, analyzing, and evaluating potential risks.
the act of creating a business plan.