Cambridge Technical Unit 3 LO1

Quiz
•
Computers
•
11th Grade
•
Hard

Jason Rivers
Used 117+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Phishing
Misleading individuals or organisation into parting with confidential and personal data to commit fraud
Looking at files, ports and locations to access, create, modify or delete files without permission
Malicious software that allows a backdoor entrance to a system or computer device
When data packets on the internet are intercepted and copied, edited or transferred to a new location
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Social Engineering
Listening into communication traffic such as email, IM, faxing or video-conferencing
Illegally removing copies of personal or company data form information systems
Manipulation of individuals to trick them into giving sensitive information
Looking at files, ports and locations to access, create, modify or delete files without permission
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Interception
Looking at files, ports and locations to access, create, modify or delete files without permission
When data packets on the internet are intercepted and copied, edited or transferred to a new location
Listening into communication traffic such as email, IM, faxing or video-conferencing
Illegally removing copies of personal or company data form information systems
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What does CIA stand for in terms of cyber security (Only write the three terms)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Changing data, information, programs or documentation without permission.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Reading or reviewing data, information or systems documentation without permission of the appropriate owner or manager.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Activity intended to gain access to data, networks, systems, hardware or software without permission of the owner or other responsible individual/organisation.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
Create a free account and access millions of resources
Similar Resources on Wayground
8 questions
Legislation

Quiz
•
9th - 12th Grade
10 questions
Hardware and Software Lesson 5 QUIZ

Quiz
•
11th Grade
10 questions
1.4.3 Client-Server and Peer to Peer Networks

Quiz
•
10th - 11th Grade
10 questions
J277 Network Threats

Quiz
•
7th - 11th Grade
14 questions
1.4 - Network Attacks

Quiz
•
7th - 12th Grade
10 questions
BTEC DIT C3 LAB - External Threats

Quiz
•
10th - 11th Grade
9 questions
Operating system

Quiz
•
11th Grade
10 questions
BTEC DIT C3 LAC - Data Protection

Quiz
•
10th - 11th Grade
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade