What is "is most commonly carried out by copying or removing personal data or confidential business information from a company's computers or electronic devices?"
A1 Threat Types

Quiz
•
Computers
•
12th Grade
•
Easy
Barry Wright
Used 11+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Employee Actions
Data Theft
Accidental Loss
Unintentional disclosure or damage to data
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. This includes breaches that are the result of both accidental and deliberate causes?"
Employee Actions
Data Theft
Accidental Loss
Unintentional disclosure or damage to data
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What "happens when data is destroyed, corrupted, or made unreadable by software applications and users?"
Employee Actions
Data Theft
Accidental Loss
Unintentional disclosure or damage to data
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is “the process of destroying data stored on tapes, hard disks and other forms of electronic media so that it is completely unreadable and cannot be accessed or used for unauthorized purposes?"
Data Theft
Destruction of Data
Withholding/disruptions of systems
Users overriding Security Controls
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is “An unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time?"
Data Theft
Destruction of Data
Withholding/disruptions of systems
Users overriding Security Controls
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Natural events (floods), other environmental conditions (heavy rain, extreme temperatures), terrorist actions and other disasters are examples of what?
Internal Threats
External Threats
Physical Threats
Social Engineering and Software Driven threats
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What "refers to all techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons?"
Social Engineering
Software-driven Threats
Network-based Threats
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
BTEC cyber security

Quiz
•
9th - 12th Grade
16 questions
Computer Security Risk

Quiz
•
12th Grade - University
13 questions
Empowerment

Quiz
•
12th Grade
20 questions
Malware and Encryption Quiz

Quiz
•
12th Grade
18 questions
Cyber EOP - Types of Threats By Mr. B

Quiz
•
9th - 12th Grade
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
10 questions
Found. of IT: Security Threats - A

Quiz
•
9th - 12th Grade
13 questions
Unit 3 - 2.4.4 - Viruses, Worms, Spyware & Adware

Quiz
•
12th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade
Discover more resources for Computers
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade
65 questions
MegaQuiz v2 2025

Quiz
•
9th - 12th Grade
10 questions
GPA Lesson

Lesson
•
9th - 12th Grade
15 questions
SMART Goals

Quiz
•
8th - 12th Grade
45 questions
Week 3.5 Review: Set 1

Quiz
•
9th - 12th Grade