Terms in cyber security

Terms in cyber security

12th Grade

6 Qs

quiz-placeholder

Similar activities

Comp.Sci

Comp.Sci

5th Grade - University

10 Qs

ITE8 - Module 4 Terms

ITE8 - Module 4 Terms

12th Grade

10 Qs

1.1 - Computer System

1.1 - Computer System

KG - University

11 Qs

Lesson 4 Network security

Lesson 4 Network security

10th - 12th Grade

8 Qs

Unit 3 - 4.1.2 Wireless Devices

Unit 3 - 4.1.2 Wireless Devices

9th Grade - University

10 Qs

Post Test perangkat input output proses

Post Test perangkat input output proses

9th - 12th Grade

10 Qs

BTEC National ICT - U1 LAA Digital Devices 3

BTEC National ICT - U1 LAA Digital Devices 3

12th Grade

10 Qs

Gathering Evidence

Gathering Evidence

9th - 12th Grade

8 Qs

Terms in cyber security

Terms in cyber security

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Razan Alghamdi undefined

Used 6+ times

FREE Resource

6 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

granting access to resources

Data Integrity

transforming data into a secure format

Multi-Factor Authentication

ensuring data has not been altered

Authentication

verifying a user's identity

Authorization

requiring multiple forms of verification

Encryption

2.

DRAG AND DROP QUESTION

1 min • 1 pt

The ​ (a)   can use​ ​ (b)   or​ ​ (c)   to attack your system

hacker
viruses
worms
firewall
antivirus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Back up your device means

Creating a copy of your device's data.
Transferring data to another device.
Updating your device's software.
Deleting all data from your device.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data Breach is

A data breach is an incident where unauthorized access to sensitive data occurs.
A data breach is a legal term for data storage.
A data breach is a type of software update.
A data breach is a method of data encryption.

5.

MATCH QUESTION

1 min • 1 pt

Match the following

a protected network connection

Cloud Computing

A security system that monitors and controls incoming and outgoing network traffic

Firewall

Software designed to disrupt, damage, or gain unauthorized access to computer systems

Phishing

a form of social engineering attack

Virtual Private Network

computing services from remote servers

Malware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Risk Assessment is

the method of calculating financial returns.
a technique for improving employee performance.
the process of identifying, analyzing, and evaluating potential risks.
the act of creating a business plan.