Cybersecurity and Data Privacy Vocabulary

Cybersecurity and Data Privacy Vocabulary

11th Grade

15 Qs

quiz-placeholder

Similar activities

Protecting Data and Information Quiz

Protecting Data and Information Quiz

12th Grade

10 Qs

J808 4.1 Types of threats

J808 4.1 Types of threats

9th - 11th Grade

20 Qs

Chapter 6: Accountability Controls

Chapter 6: Accountability Controls

University

10 Qs

Data Protection Act & Computer Misuse Act

Data Protection Act & Computer Misuse Act

11th Grade

18 Qs

Cyber Security

Cyber Security

8th - 12th Grade

10 Qs

AQA GCSE Computer Science: Computer Systems (Paper 2)

AQA GCSE Computer Science: Computer Systems (Paper 2)

9th - 11th Grade

20 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Cybersecurity Legislation and Standards Quiz

Cybersecurity Legislation and Standards Quiz

12th Grade

20 Qs

Cybersecurity and Data Privacy Vocabulary

Cybersecurity and Data Privacy Vocabulary

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Kayla Halsey

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for the condition of being private or secret?

Confidentiality

Transparency

Publicity

Disclosure

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the state of data being complete or uncorrupted?

Integrity

Latency

Redundancy

Confidentiality

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for data being accessible when needed?

Availability

Confidentiality

Integrity

Redundancy

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does IoT?

Computing technology incorporated into nontypical devices to allow communication with other devices and the internet

Input of Technology; The process of inputting data into computers

Internet of Technology; A network of computers connected for data sharing

Integration of Tools; Combining various software tools for enhanced productivity

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for computer code intentionally written to cause some form of harm?

Malware

Firmware

Shareware

Hardware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the act of digging through trash for useful information called?

Dumpster diving

Phishing

Spoofing

Tailgating

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware encrypts data to prevent user access unless a fee is paid to the hacker?

Ransomware

Adware

Spyware

Worm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?