Cybersecurity and Data Privacy Vocabulary

Cybersecurity and Data Privacy Vocabulary

11th Grade

15 Qs

quiz-placeholder

Similar activities

Cybersecurity - Software Security

Cybersecurity - Software Security

12th Grade

20 Qs

Cyber Security

Cyber Security

9th - 12th Grade

18 Qs

BTEC IT Unit 1 - D1 Threats to data

BTEC IT Unit 1 - D1 Threats to data

10th - 12th Grade

15 Qs

Computer Hardware and Software Quiz

Computer Hardware and Software Quiz

12th Grade

19 Qs

System and network support and management

System and network support and management

11th Grade - Professional Development

20 Qs

Cyber - Unit 2 Review

Cyber - Unit 2 Review

9th - 12th Grade

20 Qs

BTEC IT Unit 1 - D threats to data & laws

BTEC IT Unit 1 - D threats to data & laws

11th - 12th Grade

20 Qs

PLTW Cybersecurity

PLTW Cybersecurity

9th - 12th Grade

20 Qs

Cybersecurity and Data Privacy Vocabulary

Cybersecurity and Data Privacy Vocabulary

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Kayla Halsey

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for the condition of being private or secret?

Confidentiality

Transparency

Publicity

Disclosure

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the state of data being complete or uncorrupted?

Integrity

Latency

Redundancy

Confidentiality

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for data being accessible when needed?

Availability

Confidentiality

Integrity

Redundancy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does IoT?

Computing technology incorporated into nontypical devices to allow communication with other devices and the internet

Input of Technology; The process of inputting data into computers

Internet of Technology; A network of computers connected for data sharing

Integration of Tools; Combining various software tools for enhanced productivity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for computer code intentionally written to cause some form of harm?

Malware

Firmware

Shareware

Hardware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the act of digging through trash for useful information called?

Dumpster diving

Phishing

Spoofing

Tailgating

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware encrypts data to prevent user access unless a fee is paid to the hacker?

Ransomware

Adware

Spyware

Worm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?