Cambridge Technicals Unit 3 Cybersecurity

Quiz
•
Computers
•
11th - 12th Grade
•
Medium
Melanie Hopgood Hall
Used 69+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Unauthorised access is defined as....
Activity intended to gain access to data, networks, computer system hardware or software without the permission of the owner or other responsible individuals or organisation.
Reviewing or reading data, information or systems documentation without permission of the appropriate owner or manager.
Changing data, information, programs or documentation without permission.
Allowing information to pass to any person or organisation without permission.
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Unauthorised inspection is defined as.......
Activity intended to gain access to data, networks, computer system hardware or software without the permission of the owner or other responsible individuals or organisation.
Reviewing or reading data, information or systems documentation without permission of the appropriate owner or manager.
Changing data, information, programs or documentation without permission.
Allowing information to pass to any person or organisation without permission.
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Unauthorised modification is defined as........
Allowing information to pass to any person or organisation without permission.
Changing data, information, programs or documentation without permission.
Reviewing or reading data, information or systems documentation without permission of the appropriate owner or manager.
Activity intended to gain access to data, networks, computer system hardware or software without the permission of the owner or other responsible individuals or organisation.
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Unauthorised disclosure is defined as......
Activity intended to gain access to data, networks, computer system hardware or software without the permission of the owner or other responsible individuals or organisation.
Reviewing or reading data, information or systems documentation without permission of the appropriate owner or manager.
Changing data, information, programs or documentation without permission.
Allowing information to pass to any person or organisation without permission.
5.
FILL IN THE BLANK QUESTION
1 min • 5 pts
In CIA triad, A stands for...
6.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
The process by which criminals hide the origin of the proceeds of their crime by transferring the money through different bank accounts and countries to make it look as if it comes from a legal source.
Data mining
Money laundering
Fracking
Phishing
7.
FILL IN THE BLANK QUESTION
1 min • 5 pts
Someone without the technical expertise to create their own softwareor means of hacking into a computer system, but who uses software or scripts created by someone else to carry out hacking is known as a script ...................?
Create a free account and access millions of resources
Similar Resources on Wayground
13 questions
1.03 Copyright; Digital Design 1

Quiz
•
9th - 12th Grade
10 questions
Programming Tools

Quiz
•
6th Grade - University
10 questions
Societal Impact

Quiz
•
11th Grade
12 questions
Information Classification

Quiz
•
11th Grade
10 questions
Cambridge Technical Unit 3 LO1

Quiz
•
11th Grade
10 questions
Cybersecurity

Quiz
•
12th Grade
12 questions
ITGS: Introduction - What is ITGS

Quiz
•
9th - 12th Grade
10 questions
THE ULTIMATE KNOWLEDGE: Information techno_

Quiz
•
8th Grade - Professio...
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade