Which of the following documents is NOT a planning tool that could be used for a project?
Answer
PERT Chart
Gantt Chart
Flow Chart
Integrated Document
Question 2
Question
Choose 2 different forms of data capture
Answer
Sensors
Questionnaires
Botnet
Database
Question 3
Question
Piggybacking is a form of Social Engineering
Answer
True
False
Question 4
Question
The impacts of data being stolen are a loss of [blank_start]data[blank_end] and a loss of [blank_start]time[blank_end] and [blank_start]money[blank_end].
Answer
data
people
energy
time
data
company
money
earth
space
Question 5
Question
Choose the one IT method of preventing data loss from the list below
Answer
Passwords
Locking the system in a cupboard
Closing the door behind you
Taking the data out with you
Question 6
Question
Which of the following is a principle of the Data Protection Act. Choose 3
Answer
Data must not be kept for longer than is necessary
Data must be secure
Data must be fairly and lawfully processed
Data must be made to feel comfortable when handled
Data must be sold for maximum profit
Data must be destroyed
Question 7
Question
Planning tools are a good way to keep track of what [blank_start]tasks[blank_end] you need to do and the [blank_start]time[blank_end] you need to do them.
Answer
tasks
time
Question 8
Question
Social engineering is usually performed on a computer system.
Answer
True
False
Question 9
Question
A company's computer and data storage systems have been hacked into and data has been stolen. Choose the 2 impacts of this cyber-attack on the company.
Answer
Loss of money
Loss of time in order to replace the data
Loss of street cred
Total loss of functionality
Question 10
Question
Choose an advantage of using a sensor to collect data