Cambridge Technicals in IT - Unit 02 - LO6.1

Cambridge Technicals in IT - Unit 02 - LO6.1

11th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Use of different forms of notation

Use of different forms of notation

9th Grade - University

24 Qs

Berfikir Komputasional XI BAB 2

Berfikir Komputasional XI BAB 2

11th Grade

20 Qs

Computer Basics Quiz

Computer Basics Quiz

7th Grade - University

20 Qs

IST Digital Citizenship Test  1 Review (25/26)

IST Digital Citizenship Test 1 Review (25/26)

9th - 12th Grade

20 Qs

Module 5: Automation

Module 5: Automation

12th Grade

20 Qs

Image editing

Image editing

4th Grade - University

20 Qs

KISI SOAL PTS AIJ TKJ XI

KISI SOAL PTS AIJ TKJ XI

11th Grade

20 Qs

CHỦ ĐỀ 1 LỚP 6 P2

CHỦ ĐỀ 1 LỚP 6 P2

6th Grade - University

30 Qs

Cambridge Technicals in IT - Unit 02 - LO6.1

Cambridge Technicals in IT - Unit 02 - LO6.1

Assessment

Quiz

Information Technology (IT)

11th - 12th Grade

Practice Problem

Easy

Created by

K Wood

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What does confidentiality ensure in information security?

Data is always accessible by anyone.

Information is only accessible to authorised individuals or processes.

Information is stored in a public location.
Information is always accurate.

Answer explanation

Confidentiality ensures that only authorised individuals, groups, or processes can access sensitive data.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A company’s employee database contains personal information, which can only be accessed by HR staff. Which principle of information security is being followed?

Confidentiality.
Integrity.
Availability.
Accessibility.

Answer explanation

Limiting access to only HR staff ensures confidentiality, preventing unauthorised access.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which action would most likely violate the principle of confidentiality?

Encrypting sensitive data.
Allowing all employees unrestricted access to sensitive information.
Implementing multi-factor authentication.
Restricting access based on job roles.

Answer explanation

Allowing all employees unrestricted access to sensitive information violates confidentiality.

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

How does information integrity apply to a financial report in an organisation?

Making the report accessible only to top management.
Regularly updating the report to ensure it is accurate and up-to-date.
Storing the report in a secured location.
Publishing the report publicly.

Answer explanation

Integrity is maintained by regularly updating the financial report and ensuring it’s accurate.

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

If an organisation has set up a backup system to ensure that data can always be recovered after a disaster, which principle is this an example of?

Availability.
Integrity.
Confidentiality.
Redundancy.

Answer explanation

Availability ensures data is accessible, even in case of disaster, by using a backup system.

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A health insurance company encrypts sensitive patient data to prevent unauthorised access. Which principle of information security does this action address?

Integrity.
Availability.
Confidentiality.
Compliance.

Answer explanation

Encryption ensures that only authorised individuals can access sensitive data, protecting confidentiality.

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

An employee updates the customer records to ensure they are current and accurate. This ensures which principle of information security?

Availability.
Integrity.
Confidentiality.
Security.

Answer explanation

Integrity ensures that customer records are up-to-date and accurate, maintaining the quality of information.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?