Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our Cookie Policy
Accept
© eRevision.uk and ZigZag Education 2025
This test is run by .
Note that your final mark will not be saved in the system.

Protection GapFill

Target Level
Pass
Running Total
0
0%
Attempt
1 of 3

You must fill all the gaps before clicking ‘Check Answers!’

 PermissionsPoliciesLegal protectionsLegislations are the rules and procedures that businesses use in order to protect themselves from malware attacks and data breaches, or to recover from an incident. They help ensure that businesses are compliant with all of the government legislation that they are expected to follow, such as the Data  PaternalProtectionPremiumPaper Act.

Staff are only given access to the files and shared folders that they need, by setting file  opensloggingpermissionsaudit trails. Each member of staff is  righteousresponsiblereprehensibleirresponsible for following the company policies required to keep the data secure.

A business must continue operating after a data breach, a system malfunction, or a disaster such as a flood. The  disaster recoverysevere weathersnow dayflood plan will range from a simple restore from backups, all the way to moving to a new location if the current building is damaged or destroyed by a flood or a fire. The faster the business is able to recover, the sooner normal work resumes, and less  moneyreputationstaffingtraining is lost.

Businesses need to assess all of the  structurebenefitsneedsrisks that could affect the business, and work out how to minimise each. They can be displayed in a grid (sometimes called a matrix), based on the severity of each risk and its likelihood of occurring.

The protection measures should be regularly  deletedremovedtestedlost to ensure that they are effective. For example, a business might employ someone to attempt to break into their system, or check that they can restore from their backups.

All staff must be  firedshown the first-aid boxsafety assessedtrained when they join the company, otherwise they won’t be familiar with the different policies – it is essential for the documents to be active and not to be gathering dust in the filing cabinet. Staff may also require annual refreshers that serve as a reminder.

Protection can be  logicalphysicalcyberimagined, such as securing doors and equipment with locks, keypads and cards. If the protection includes attributes about us, such as fingerprints or facial recognition, we call these  biometricsbiologicalbioengineeringbiology. We can also keep a copy of important data at another location, which is called   an offsite backupan online backupa safe housea child backup. Any paper that contains confidential data should be  shreddedcrushedincineratedtorn up before it is recycled.

 LogicalPhysicalImaginedCyber protection can use software and permissions; for example, giving someone the minimum permissions, installing antivirus and firewall software, and using  encryptionnetworkspermissionspublic Wi-Fi to protect data while it is at rest and in motion.

This is your 1st attempt! You get 3 marks for each one you get right. Good luck!

Pass Mark
72%