Learning Unit 4
Quiz by Mr. Zulu
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
78 questions
Show answers
- Q1What is one of the main data privacy concerns facing today’s organisations?Employee moraleData breachesOffice supplies budgetCustomer loyalty30s
- Q2What is a common method used by cybercriminals to exploit data privacy in organisations?CompostingPhishingPaper shreddingRecycling30s
- Q3What is the term used to describe the practice of collecting personal data without the knowledge or consent of individuals?Social networkingData miningBlockchain technologyCloud computing30s
- Q4What is the term used to describe the unauthorized access, use, or disclosure of personal data?Data breachIT supportNetwork securityData encryption30s
- Q5What is the practice of encrypting data to protect it from unauthorized access or cyberattacks?Data encryptionSocial engineeringData breachPhishing30s
- Q6What is the term used to describe the process of obtaining personal information by deceiving individuals into providing it?Data backupSocial engineeringNetwork firewallAntivirus software30s
- Q7What is a method used to protect sensitive information by restricting access to authorized users?Data breachData miningAccess controlCloud computing30s
- Q8What is the term used to describe the legal requirements and regulations governing the collection and use of personal data?Cookie policyData protection lawsWireless hotspotSpam filter30s
- Q9What is the term used to describe the practice of monitoring and recording individuals' online activities without their knowledge or consent?Online trackingServer maintenanceData encryptionBiometric authentication30s
- Q10What is one of the key principles of data privacy that emphasizes the purpose for which personal data is collected?Data miningData hoardingPurpose limitationData sharing30s
- Q11What is the primary goal of a cyberattack?To promote online privacyTo establish secure networksTo enhance cybersecurity measuresTo compromise or damage data or systems30s
- Q12What is a common method used by cyber criminals to initiate cyberattacks?Data encryptionSoftware updatesFirewall configurationPhishing30s
- Q13What is the potential cost of a cyberattack to a business?Employee satisfaction, sustainability efforts, and innovation opportunitiesIncreased productivity, market expansion, and customer loyaltyFinancial losses, damage to reputation, and legal penaltiesCost savings, operational efficiency, and strategic partnerships30s
- Q14What is one potential consequence of a successful cyberattack on a healthcare organization?Streamlined administrative processesImproved patient care and treatment outcomesCompromised patient data leading to privacy breachesEnhanced collaboration among healthcare professionals30s
- Q15What is a common form of cyberattack that involves malicious software designed to block access to a computer system or files until a sum of money is paid?RansomwareAdwareMalwareSpyware30s