Ethical Hacking Revision

Ethical Hacking Revision

9th Grade

20 Qs

quiz-placeholder

Similar activities

Key Term Review: Fundamentals of Modeling

Key Term Review: Fundamentals of Modeling

9th - 12th Grade

20 Qs

J808 4.1 Types of threats

J808 4.1 Types of threats

9th - 11th Grade

20 Qs

Impacts of Technology

Impacts of Technology

9th - 10th Grade

20 Qs

Sell Right LAP Test

Sell Right LAP Test

9th - 12th Grade

20 Qs

AQA GCSE Computer Science Paper 1

AQA GCSE Computer Science Paper 1

9th - 11th Grade

20 Qs

1.6 Revision

1.6 Revision

2nd - 9th Grade

16 Qs

N5 WDD: Analysis Design and HTML

N5 WDD: Analysis Design and HTML

5th - 12th Grade

15 Qs

AQA GCSE Computer Science: Computer Systems (Paper 2)

AQA GCSE Computer Science: Computer Systems (Paper 2)

9th - 11th Grade

20 Qs

Ethical Hacking Revision

Ethical Hacking Revision

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Laura Sherrington

Used 356+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following refers to someone who has a conviction?

Someone who has committed a crime

Someone who witnessed a crime

Someone who has been found guilty of a crime

Someone who is caught in the act of committing a crime

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Two CDs containing details of the last 500 employee sickness records has gone missing. These CD's were not encrypted.


Which one of the following laws has been broken?

Police and Justice Act

Computer Misuse Act

Regulation of Investigatory Powers Act

Data Protection Act

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following is the name of the software that is designed to record every action which is typed with the aim of stealing sensitive data?

Trojan horse

Worm

Keylogger

Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following defines the various programs used to communicate instructions to a computer and connected devices

Operating system software

Hardware devices

Office application software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Having a password that consists of a combination of letters, both uppercase and lowercase, numbers and symbols is known as which of the following?

Secure password

Solid password

Keylogger password

Trojan password

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does RIPA stand for?

Regulation of Investigatory Powers Act

Regulation of Information Powers Act

Regulation of Investigatory Protection Act

Recovery of Investigatory Powers Act

Recovery of Information Powers Act

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following laws prevents unlawful and authorised interception of electronic communication?

Regulation of Investigatory Powers Act

Regulation of Investigation Act

Regulator of Investigation Powers Act

Regulating of Investigations Act

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?