Ethical Hacking Revision

Ethical Hacking Revision

9th Grade

20 Qs

quiz-placeholder

Similar activities

Laws

Laws

9th Grade

15 Qs

1.6 Privacy & Surveillance & Computing Laws

1.6 Privacy & Surveillance & Computing Laws

8th - 11th Grade

25 Qs

GCSE Computer Science - Legal

GCSE Computer Science - Legal

9th - 11th Grade

25 Qs

BTEC Digital IT Key Terms Quiz

BTEC Digital IT Key Terms Quiz

9th Grade

20 Qs

CLASS 9 SELF MANAGEMENT

CLASS 9 SELF MANAGEMENT

9th Grade

18 Qs

Ethical, legal, cultural and environmental concerns: GCSE 9-1 Computer Science

Ethical, legal, cultural and environmental concerns: GCSE 9-1 Computer Science

9th - 12th Grade

15 Qs

Ethical, Environmental, Cutural & Legal Impacts

Ethical, Environmental, Cutural & Legal Impacts

9th - 10th Grade

17 Qs

Introduction to AI

Introduction to AI

9th Grade

18 Qs

Ethical Hacking Revision

Ethical Hacking Revision

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Laura Sherrington

Used 353+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to someone who has a conviction?

Someone who has committed a crime

Someone who witnessed a crime

Someone who has been found guilty of a crime

Someone who is caught in the act of committing a crime

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Two CDs containing details of the last 500 employee sickness records has gone missing. These CD's were not encrypted.


Which one of the following laws has been broken?

Police and Justice Act

Computer Misuse Act

Regulation of Investigatory Powers Act

Data Protection Act

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is the name of the software that is designed to record every action which is typed with the aim of stealing sensitive data?

Trojan horse

Worm

Keylogger

Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following defines the various programs used to communicate instructions to a computer and connected devices

Operating system software

Hardware devices

Office application software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a password that consists of a combination of letters, both uppercase and lowercase, numbers and symbols is known as which of the following?

Secure password

Solid password

Keylogger password

Trojan password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does RIPA stand for?

Regulation of Investigatory Powers Act

Regulation of Information Powers Act

Regulation of Investigatory Protection Act

Recovery of Investigatory Powers Act

Recovery of Information Powers Act

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following laws prevents unlawful and authorised interception of electronic communication?

Regulation of Investigatory Powers Act

Regulation of Investigation Act

Regulator of Investigation Powers Act

Regulating of Investigations Act

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?