Search Header Logo
Unit 1: Loss of Data D1.3.1-1.3.3

Unit 1: Loss of Data D1.3.1-1.3.3

Assessment

Presentation

Information Technology (IT)

Vocational training

Practice Problem

Hard

Created by

Kimberly O'Brien

FREE Resource

23 Slides • 25 Questions

1

media

2

media

3

Multiple Choice

Which of the following is a technical failure that can lead to data loss in modern systems?

1

Silent Data Corruption (SDC)

2

Reputation damage

3

Financial losses

4

Legal liability

4

Open Ended

Why is understanding the causes and consequences of data loss important for organizations today?

5

media

6

Open Ended

If a college loses student data due to a hack, which specific Data Protection principle has been breached?

7

media

8

media

9

Multiple Choice

Which type of technical failure is described as 'The Silent Killer' in modern computing systems, and why is it particularly dangerous?

1

Silent Data Corruption (SDC); because it occurs without warning and can contaminate entire datasets

2

System crash; because it stops all operations immediately

3

Network outage; because it disconnects users from the system

4

Power failure; because it can damage hardware

10

media

11

Multiple Choice

Based on the Spark architecture diagram, at which stage in the RDD pipeline could silent data corruption during decompression cause files to be skipped?

1

Map stage

2

Flatmap stage

3

ReduceByK stage

4

Collect stage

12

media

13

media

14

Multiple Choice

Which of the following is NOT a primary suspect in human-caused data loss according to the lesson?

1

Accidental Deletion

2

Migration Errors

3

Social Engineering

4

Hardware Failure

15

Open Ended

Explain how migration errors can lead to data loss during system upgrades or data transfers. Provide an example scenario.

16

Fill in the Blank

The most common cause of data loss in organizations is ___ error.

17

media

18

Multiple Choice

Which of the following is NOT listed as a common threat to data loss in modern IT systems?

1

Ransomware / Malware

2

Human Error

3

Hardware Failure

4

Phishing Attacks

19

media

20

media

21

Open Ended

Explain how data breaches can lead to reputational damage for organizations, using the Equifax case as an example.

22

media

23

Fill in the Blank

After a major data breach, companies often increase ___ to demonstrate investment in employee wellbeing and retention.

24

Multiple Select

Which actions do companies most commonly take to restore moral capital after a data breach, according to research by Akey et al.?

1

Charitable contributions

2

Employee compensation rises

3

Rebuilding trust

4

Increasing product prices

25

media

26

Multiple Select

Based on the crisis management simulation, which TWO actions are recommended to restore public trust and stakeholder confidence after a data breach?

1

Run TV Advertising Campaign

2

Donate to Charity

3

Increase Employee Wages

4

Ignore It Entirely

27

media

28

Multiple Choice

What is the primary focus of damages in English law as introduced in the chapter 'Legal Reckoning'?

1

Punishing the wrongdoer

2

Compensating the victim

3

Restoring moral capital

4

Preventing future breaches

29

media

30

Multiple Select

Which of the following are necessary for a claimant to prove their losses in court according to the burden of proof?

1

Detailed records

2

Vague thoughts

3

Supporting documentation

4

Immediate payment

31

Open Ended

Explain the difference between direct loss and consequential loss in the context of contract law damages.

32

Multiple Choice

Which principle in contract law aims to restore the claimant to their original position as if the contract had been properly performed?

1

Punitive Principle

2

Compensatory Principle

3

Restitution Principle

4

Deterrence Principle

33

media

34

Fill in the Blank

The principle of ___ is used in English law to prevent suppliers from being liable for losses that are too remote.

35

media

36

media

37

Open Ended

Based on the evidence provided in the courtroom activity, was the £500,000 loss reasonably foreseeable by the supplier at the time of contract formation? Justify your answer using the remoteness test.

38

media

39

media

40

Multiple Select

Which of the following are hardware defence strategies against data loss?

1

Redundancy Computing

2

Fault-Tolerant Libraries

3

ECC Memory

4

Data Encryption

41

media

42

media

43

Multiple Choice

Which of the following terms refers to hardware-level data corruption that occurs without error messages or system crashes?

1

Silent Data Corruption (SDC)

2

Bitflip

3

Human Error

4

Software Redundancy

44

media

45

Fill in the Blank

Reputational shocks erase ___% of a firm's value within 30 days after a data breach is disclosed.

46

Open Ended

Explain how a single CPU error can impact a company's reputation and what steps firms might take to rebuild after such an incident.

47

Open Ended

What aspect of data loss would you like to explore further or discuss in more detail after this session?

48

Multiple Choice

Reflecting on today's lesson, which of the following is NOT a primary learning objective when investigating data loss?

1

Analyze technical failures and human errors

2

Evaluate consequences such as downtime and financial loss

3

Apply English law principles to determine legal responsibility

4

Design new data storage systems

media

Show answer

Auto Play

Slide 1 / 48

SLIDE