Definition of Phishing
Cambridge Technical Unit 3 LO1

Quiz
•
Computers
•
11th Grade
•
Hard

Jason Rivers
Used 115+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Misleading individuals or organisation into parting with confidential and personal data to commit fraud
Looking at files, ports and locations to access, create, modify or delete files without permission
Malicious software that allows a backdoor entrance to a system or computer device
When data packets on the internet are intercepted and copied, edited or transferred to a new location
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Social Engineering
Listening into communication traffic such as email, IM, faxing or video-conferencing
Illegally removing copies of personal or company data form information systems
Manipulation of individuals to trick them into giving sensitive information
Looking at files, ports and locations to access, create, modify or delete files without permission
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Definition of Interception
Looking at files, ports and locations to access, create, modify or delete files without permission
When data packets on the internet are intercepted and copied, edited or transferred to a new location
Listening into communication traffic such as email, IM, faxing or video-conferencing
Illegally removing copies of personal or company data form information systems
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What does CIA stand for in terms of cyber security (Only write the three terms)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Changing data, information, programs or documentation without permission.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Reading or reviewing data, information or systems documentation without permission of the appropriate owner or manager.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What term matches this definition
Activity intended to gain access to data, networks, systems, hardware or software without permission of the owner or other responsible individual/organisation.
Unauthorised Access
Unauthorised Inspection
Unauthorised Modification
Unauthorised Disclosure
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Computers and UK Law KS4

Quiz
•
7th - 11th Grade
10 questions
NETWORK DEVICES

Quiz
•
9th - 11th Grade
7 questions
Ethics - Legislation - Computer Science

Quiz
•
11th Grade
15 questions
BTEC IT Unit 1 - D1 Threats to data

Quiz
•
10th - 12th Grade
15 questions
Networks

Quiz
•
9th - 12th Grade
10 questions
Networking

Quiz
•
10th - 12th Grade
10 questions
Programming - Basic File Handling Operations

Quiz
•
3rd - 11th Grade
10 questions
Networks 1

Quiz
•
9th - 11th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade