
Cambridge Technical Unit 3 LO1
Authored by Jason Rivers
Computers
11th Grade
Used 119+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Phishing
Misleading individuals or organisation into parting with confidential and personal data to commit fraud
Looking at files, ports and locations to access, create, modify or delete files without permission
Malicious software that allows a backdoor entrance to a system or computer device
When data packets on the internet are intercepted and copied, edited or transferred to a new location
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Social Engineering
Listening into communication traffic such as email, IM, faxing or video-conferencing
Illegally removing copies of personal or company data form information systems
Manipulation of individuals to trick them into giving sensitive information
Looking at files, ports and locations to access, create, modify or delete files without permission
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Interception
Looking at files, ports and locations to access, create, modify or delete files without permission
When data packets on the internet are intercepted and copied, edited or transferred to a new location
Listening into communication traffic such as email, IM, faxing or video-conferencing
Illegally removing copies of personal or company data form information systems
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What does CIA stand for in terms of cyber security (Only write the three terms)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Changing data, information, programs or documentation without permission.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Reading or reviewing data, information or systems documentation without permission of the appropriate owner or manager.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Activity intended to gain access to data, networks, systems, hardware or software without permission of the owner or other responsible individual/organisation.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Quiz Sistem Keamanan Jaringan
Quiz
•
11th Grade
15 questions
Partes de una PC
Quiz
•
7th Grade - University
10 questions
TIN 11 - PYTHON - PHÉP TOÁN - BIỂU THỨC - CÂU LỆNH GÁN
Quiz
•
11th Grade
15 questions
Quis Grade 5
Quiz
•
9th - 12th Grade
14 questions
Input, output and storage de
Quiz
•
8th Grade - Professio...
10 questions
Review Quiz #2- Productivity Tools
Quiz
•
11th - 12th Grade
10 questions
Network
Quiz
•
10th - 11th Grade
10 questions
Post Test perangkat input output proses
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade