This test is run by .
Note that your final mark will not be saved in the system.
Note that your final mark will not be saved in the system.
The impacts of a cyber-security attack (4.2) and prevention measures (4.3) MatchUp
Target Level
Pass
Running Total
0
0%
Attempt
1 of 3
Click on a top box, then click on its match below. Or, drag a top box and drop it onto the correct match. Match all pairs before clicking ‘Check’.
Overwriting
Backup
Magnetic wipe
Biometric
Antivirus software
Encryption
Password
Username
Physical destruction
Program used to identify and remove malware
Copy of data that can be used to restore data if the original copy is lost, corrupted or destroyed
Security measure that uses a physical characteristic (e.g. fingerprint) to identify users
Scrambling data so that it can be read only by users with the appropriate 'key'
Using a magnet to alter the bits stored in a storage device (e.g. mechanical hard drive, tape and obsolete floppy disks), making the device unusable and its data unreadable
Filling a storage device with meaningless data so that any data that was previously on the storage device can no longer be read
Sequence of characters needed to gain access to a system after the user's identity has been verified
Causing damage to a storage device so that its data can no longer be recovered from it
Unique name that identifies a particular user of a system