Search Header Logo

Protecting Data and Information (Learning Aim D)

Authored by Fiona Keenan

Information Technology (IT)

Vocational training

Used 5+ times

Protecting Data and Information (Learning Aim D)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Data integrity is about keeping data accurate and current.

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The term used to describe the action or harm carried out by / caused by a virus is?

Damage

Payload

Execution

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware which replicates using networks and security holes without having to attach to another program is a?

Spider

Trojan Horse

Worm

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A keylogger is a type of?

Ransomware

Spyware

Botnet

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

A hacker who finds weaknesses in the company's systems with their permission is a/an?

Grey hat hacker

Black hat hacker

Ethical hacker

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking without permission is illegal under the?

Data Protection Act 2018

GDPR 2018

Computer Misuse Act 1990

Copyright, Designs & Patents Act 1992

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data security is keeping data safe from being stolen, misused, accidentally or deliberately destroyed.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?