Unit 1 LO5 Ethical and Operational Issues and Threats
Quiz
•
Computers
•
12th Grade
•
Easy
Barry Wright
Used 79+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a physical method of improving the security of information?
Defragmenting the main server hard drive.
Installing anti-virus software.
Locking server room doors.
Backing up data.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following attempts to gain information does not use social engineering?
“Hi, I am new and don’t understand how to access the portal, Andrea says I need a token code but I don’t know what this is.”
“Hi, I am not at work at the moment, but have been locked out of my machine. Could you reset my password please so I can complete this report for the boss?”
“The boss has asked for this information. Do you really want to upset her?”
“What is the security code needed to access the Web Server?”
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an advantage of using RFID technology rather than a barcode to track packages?
Packages do not need to be in line of sight of the reader to be identified.
RFID tags do not need a source of power.
RFID technology does not need specialist equipment to identify packages.
Metal interferes with the RFID signals.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes one reason why privacy screens are attached to monitors?
To comply with the Copyright, Design and Patents Act 1988.
To improve the working conditions of staff.
To protect data and information from being seen by unauthorised viewers.
To reduce glare on the screens.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes how overwriting old data protects it from being accessed.
All data held on the hard disc is deleted.
The data held in each bit on the hard disc is replaced with fresh data.
The data is encrypted so that it cannot be accessed.
The file names are changed so that the data cannot be found.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a weakness of using a firewall to protect a website?
Does not prevent an authorised user from using the system maliciously.
The firewall restricts access only to those who have previously been on the website.
The firewall will only allow data to flow from the viewer’s machine to the website.
The firewall will only allow data to flow from the website to the viewer’s machine.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of staying safe online?
Switching off the firewall.
Regularly changing passwords.
Providing personal details for public access.
Updating anti–virus software on an annual basis.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
ASPEK LEGAL TIK XII
Quiz
•
12th Grade
20 questions
Pengayaan Informatika
Quiz
•
12th Grade
10 questions
Working with tables
Quiz
•
5th - 12th Grade
11 questions
Cascading Style Sheets
Quiz
•
8th - 12th Grade
20 questions
Online Platform Block Q
Quiz
•
11th - 12th Grade
20 questions
City & Guilds Award in Business Processes
Quiz
•
12th Grade
10 questions
EMPTECH L4 Q2
Quiz
•
12th Grade
10 questions
PRE-ASSESSMENT ETECH M1
Quiz
•
12th Grade
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
