Page 29 - Workbook - Intermediate Corporate - with solutions
P. 29
Corporate Topic | Cybersecurity
WORKSHEET - Lesson
1. Use the words below in your professional context.
LET’S TALK KEEP TALKING
hack trigger
hijack outage
detect enormous
theft infect
offensive intrusion
sanction (n) savvy
wreak havoc extortion
out of whack profiteering
sketchy myriad
2.
. Hackers can easily __ databases and access sensitive information.
a. trigger b. detect c. infiltrate
2. Last week our IT department identified a serious security __.
a. breach b. sanction c. theft
3. I haven't been able to __ my calendar on the phone.
a. hack b. sync c. proliferate
4. My computer is totally __. I can't even open my email.
a. out of whack b. enormous c. offensive
5. The virus __ on my computer. I will probably have to buy a new
one.
a. wreaked havoc b. enabled c. prompted
6. Online shoppers are more at risk of becoming victims of __.
a. sanction b. outbreak c. identity theft
7. When a threat is detected, the system will __ an alert.
a. trigger b. detect c. infect
8. Every day cyber threats __ and become more and more complex.
a. proliferate b. hijack c. secure
9. If an email has a/an __ attachment, don't open it.
a. savvy b. offensive c. sketchy
10. I can't access my private email account. It has been __.
a. secured b. prompted c. hijacked
27