A1 Threat Types

A1 Threat Types

12th Grade

15 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

9th - 12th Grade

18 Qs

BTEC IT Unit 1 - D1 Threats to data

BTEC IT Unit 1 - D1 Threats to data

10th - 12th Grade

15 Qs

Cybersecurity Lesson 4 - Malware Quiz

Cybersecurity Lesson 4 - Malware Quiz

12th Grade

14 Qs

SHS_Empowerment Technologies_MELC#2_QUIZ2

SHS_Empowerment Technologies_MELC#2_QUIZ2

11th - 12th Grade

10 Qs

Virus y otras amenzas

Virus y otras amenzas

12th Grade

14 Qs

Computer Quiz 2

Computer Quiz 2

6th - 12th Grade

11 Qs

Empowerment Technologies Lesson 2

Empowerment Technologies Lesson 2

11th - 12th Grade

13 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

A1 Threat Types

A1 Threat Types

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Barry Wright

Used 11+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "is most commonly carried out by copying or removing personal data or confidential business information from a company's computers or electronic devices?"

Employee Actions

Data Theft

Accidental Loss

Unintentional disclosure or damage to data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "a breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. This includes breaches that are the result of both accidental and deliberate causes?"

Employee Actions

Data Theft

Accidental Loss

Unintentional disclosure or damage to data

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What "happens when data is destroyed, corrupted, or made unreadable by software applications and users?"

Employee Actions

Data Theft

Accidental Loss

Unintentional disclosure or damage to data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is “the process of destroying data stored on tapes, hard disks and other forms of electronic media so that it is completely unreadable and cannot be accessed or used for unauthorized purposes?"

Data Theft

Destruction of Data

Withholding/disruptions of systems

Users overriding Security Controls

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is “An unplanned event that causes the general system or major application to be inoperable for an unacceptable length of time?"

Data Theft

Destruction of Data

Withholding/disruptions of systems

Users overriding Security Controls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Natural events (floods), other environmental conditions (heavy rain, extreme temperatures), terrorist actions and other disasters are examples of what?

Internal Threats

External Threats

Physical Threats

Social Engineering and Software Driven threats

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What "refers to all techniques aimed at talking a target into revealing specific information or performing a specific action for illegitimate reasons?"

Social Engineering

Software-driven Threats

Network-based Threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?