Search Header Logo

Cybersecurity - Software Security

Authored by Shamini Johnrose

Computers

12th Grade

Used 4+ times

Cybersecurity - Software Security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The designers of a new banking app believe that new clients should not only enter their client number and

password but also a verification code, and scan one of their fingerprints to sign into their account.

This security measure is best described as

general authentication.

two-factor authentication.

multi-factor authentication.

single-factor authentication.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Characteristics of data that has integrity include

authenticity, clarity and relevance.

accuracy, clarity and completeness.

accuracy, relevance and readability.

accuracy, reasonableness and relevance.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Actual data sets are not used to test software. Data sets are manufactured to test software.

If a manufactured data set was accidentally stored with an actual data set, what characteristic of data integrity would be most undermined by this mix-up?

value

timeliness

authenticity

reasonableness

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which one of the following best represents an ethical, but not legal, issue that may arise during the software development process?

using customer data for personal financial gain

incorporating addictive design elements in a children’s online learning application

collecting sensitive data during a survey without the participant knowing what the data will be used for

using code from a similar piece of software without the permission of the original developer

5.

MULTIPLE SELECT QUESTION

1 min • 1 pt

SeeMePoze is a new social media app. The following information was posted on the developer’s website:

‘SeeMePoze allows a diverse range of users to share their creativeness with the rest of the world through its

distinctive editing features. Get Pozing!’ This information is an example of

a marketing strategy.

a goal of an information system.

an objective of an information system.

a mission statement of an organisation.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a likely threat to the software assets of an organisation?

Natural disasters

Malware

Market competition

Theft

7.

OPEN ENDED QUESTION

1 min • 1 pt

List three ways of securing a building with IT resources.

Evaluate responses using AI:

OFF

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?