WJEC ICT - Chapter 3 - Data loss, theft and manipulation

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

10th Grade

11 Qs

quiz-placeholder

Similar activities

Cuestionario Ciberseguridad 3 - Política de seguridad

Cuestionario Ciberseguridad 3 - Política de seguridad

University

10 Qs

Анализ данных в игровой индустрии

Анализ данных в игровой индустрии

University

10 Qs

Keamanan Data Pribadi untuk Pelajar

Keamanan Data Pribadi untuk Pelajar

10th Grade

10 Qs

Data Protection

Data Protection

KG - Professional Development

10 Qs

AI Legislation in the UK Quiz

AI Legislation in the UK Quiz

12th Grade

15 Qs

DPA CMA

DPA CMA

10th - 12th Grade

15 Qs

Data Security

Data Security

University

15 Qs

Aspek Legal TIK IPA6

Aspek Legal TIK IPA6

12th Grade

16 Qs

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Jordan Firth

Used 6+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which prevention strategy would commonly be used to deal with power outages?

Staff training

Anti-malware software

Encryption

Uninterruptible power supplies (UPS)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software developer has had some code stolen by a competitor. What are the implications of this?

Loss of service

Breach of GDPR

Blackmail

Competitor advantage

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which prevention strategy is commonly used to prevent data interception?

Change backup schedules

Locks

Anti-malware software

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a website is down for 24 hours and customers are unable to access it, what are the financial implications?

Loss of sales/revenues

Fines to regulators

Compensation to customers due to breaking the law

Discounted prices for poor customer service

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Customers are angry that a company could not keep their data safe and have problems trusting them in the future, it could also lead to negative reviews online. Identify the potential implication of this.

Blackmail

Loss of reputation

Loss of service

Breach of GDPR

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term would be used to describe a hacker that is demanding a company pays £10,000 so they can regain access to important customer data?

Competitor advantage

Loss of reputation

Blackmail/ransom

Loss of service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A website is down for 24 hours and customers are unable to access it, leading to a loss in sales. What are the implications of this?

Breach of GDPR

Blackmail

Competitor advantage

Loss of service

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?