Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our Cookie Policy
Accept
© eRevision.uk and ZigZag Education 2025
This test is run by .
Note that your final mark will not be saved in the system.

Protection MatchUp

Target Level
Pass
Running Total
0
0%
Attempt
1 of 3

Click on a top box, then click on its match below. Or, drag a top box and drop it onto the correct match. Match all pairs before clicking ‘Check’.

Policies, e.g. information security
Disaster recovery procedures
Encryption
Principle of least privilege
Security staff
Staff training
Password
Staff access rights
Two-factor authentication
Rules and procedures that businesses use to protect against malware attacks, data breaches and loss, etc.
Allow, deny, read only, write, etc. to files and shared folders
Implemented after a data breach, or after a hazard such as flood, fire or equipment failure
Teaching users about the policies, and how to follow them
Uses two methods of identifying a user, e.g. something they know, are, have, location, etc.
Carry out walkthroughs of buildings and check people entering the building are authorised to
Giving users as little access to a computer system as possible by default
Converting plain text to cipher text using keys, to make data difficult to decode if intercepted
Combination of letters, numbers and symbols used to log in, used as well as a username

This is your 1st attempt! You get 3 marks for each one you get right. Good luck!

Pass Mark
75%