Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our Cookie Policy
Accept
© eRevision.uk and ZigZag Education 2025
This test is run by .
Note that your final mark will not be saved in the system.

The impacts of a cyber-security attack (4.2) and prevention measures (4.3) MatchUp

Target Level
Pass
Running Total
0
0%
Attempt
1 of 3

Click on a top box, then click on its match below. Or, drag a top box and drop it onto the correct match. Match all pairs before clicking ‘Check’.

Overwriting
Backup
Magnetic wipe
Biometric
Antivirus software
Encryption
Password
Username
Physical destruction
Program used to identify and remove malware
Copy of data that can be used to restore data if the original copy is lost, corrupted or destroyed
Security measure that uses a physical characteristic (e.g. fingerprint) to identify users
Scrambling data so that it can be read only by users with the appropriate 'key'
Using a magnet to alter the bits stored in a storage device (e.g. mechanical hard drive, tape and obsolete floppy disks), making the device unusable and its data unreadable
Filling a storage device with meaningless data so that any data that was previously on the storage device can no longer be read
Sequence of characters needed to gain access to a system after the user's identity has been verified
Causing damage to a storage device so that its data can no longer be recovered from it
Unique name that identifies a particular user of a system

This is your 1st attempt! You get 3 marks for each one you get right. Good luck!

Pass Mark
75%