This test is run by .
Note that your final mark will not be saved in the system.
Note that your final mark will not be saved in the system.
D2 Protecting data MatchUp
Target Level
C
Running Total
0
0%
Attempt
1 of 3
Click on a top box, then click on its match below. Or, drag a top box and drop it onto the correct match. Match all pairs before clicking ‘Check’.
Recovery
Access levels
Digital certificate
Backup
File permissions
Full control
Physical access controls
PIN
Read-only
Password
Protocol
Read-only, read and write, and full control, for example
More senior staff can view more files and shared drives. They have higher...
A copy of files (e.g. taken daily or weekly) to be able to restore lost data from
Act and method of restoring lost or corrupted data
Locks, keypads and biometrics, for example
Sequence of numbers used to gain access to a computer, room or ATM
Sequence of letters, numbers and characters used to gain system access in combination with a username, customer ID or email address
Verification that a website is genuine or a product has been provided by the correct company
The rules set out for data communication concerning packets, speed, etc.
File permission that doesn't allow the file to be edited
File permission that enables the file to be deleted