Cybersecurity and Data Privacy Vocabulary

Cybersecurity and Data Privacy Vocabulary

11th Grade

15 Qs

quiz-placeholder

Similar activities

AQA GCSE Computer Science: Computer Systems (Paper 2)

AQA GCSE Computer Science: Computer Systems (Paper 2)

9th - 11th Grade

20 Qs

EC11-07-Social, ethical and legal implications of Enterprises

EC11-07-Social, ethical and legal implications of Enterprises

11th Grade

20 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Target

Target

University

16 Qs

POCS-Ch. 2 Review (Comprehension)

POCS-Ch. 2 Review (Comprehension)

7th - 12th Grade

20 Qs

J808 4.1 Types of threats

J808 4.1 Types of threats

9th - 11th Grade

20 Qs

Chapter 6: Accountability Controls

Chapter 6: Accountability Controls

University

10 Qs

Data Protection Act & Computer Misuse Act

Data Protection Act & Computer Misuse Act

11th Grade

18 Qs

Cybersecurity and Data Privacy Vocabulary

Cybersecurity and Data Privacy Vocabulary

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Kayla Halsey

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for the condition of being private or secret?

Confidentiality

Transparency

Publicity

Disclosure

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the state of data being complete or uncorrupted?

Integrity

Latency

Redundancy

Confidentiality

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for data being accessible when needed?

Availability

Confidentiality

Integrity

Redundancy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does IoT?

Computing technology incorporated into nontypical devices to allow communication with other devices and the internet

Input of Technology; The process of inputting data into computers

Internet of Technology; A network of computers connected for data sharing

Integration of Tools; Combining various software tools for enhanced productivity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for computer code intentionally written to cause some form of harm?

Malware

Firmware

Shareware

Hardware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the act of digging through trash for useful information called?

Dumpster diving

Phishing

Spoofing

Tailgating

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware encrypts data to prevent user access unless a fee is paid to the hacker?

Ransomware

Adware

Spyware

Worm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?