IT9626 unit 3 & 5 Test

IT9626 unit 3 & 5 Test

12th Grade

8 Qs

quiz-placeholder

Similar activities

Pneumatic Systems Quiz

Pneumatic Systems Quiz

12th Grade

10 Qs

Lez. 03 - Ripasso delle puntate precedenti 02 (Full)

Lez. 03 - Ripasso delle puntate precedenti 02 (Full)

9th - 12th Grade

10 Qs

18 - 19. YÜZYIL FELSEFESİ

18 - 19. YÜZYIL FELSEFESİ

11th - 12th Grade

12 Qs

Seguridad en la Era Digital

Seguridad en la Era Digital

12th Grade

10 Qs

Ciberamenazas Quiz

Ciberamenazas Quiz

12th Grade

10 Qs

Quiz sobre Malware

Quiz sobre Malware

9th - 12th Grade

9 Qs

The Automobile

The Automobile

8th Grade - Professional Development

10 Qs

MÓDULO 1

MÓDULO 1

1st Grade - University

10 Qs

IT9626 unit 3 & 5 Test

IT9626 unit 3 & 5 Test

Assessment

Quiz

Instructional Technology

12th Grade

Easy

Created by

Ehtesham Malik

Used 1+ times

FREE Resource

8 questions

Show all answers

1.

OPEN ENDED QUESTION

5 mins • 7 pts

In a recent BBC news bulletin it was said: ‘It takes 82 seconds for cyber-thieves to ensnare the first victim of a phishing campaign, a report suggests.’ ‘Hackers exploit router flaws in unusual pharming attack.’ Describe what is meant by:

(a) phishing 4 marks

(b) pharming 3 marks

Evaluate responses using AI:

OFF

2.

OPEN ENDED QUESTION

5 mins • 6 pts

Personal data and other sensitive types of data often need to be kept confidential or restricted to authorised staff. Explain why personal data should be kept confidential (6 marks)

Evaluate responses using AI:

OFF

3.

OPEN ENDED QUESTION

10 mins • 8 pts

Phishing is an attempt by fraudsters to gather personal information using email. Receivers of emails should use several different methods to prevent phishing attacks. Evaluate the different methods which can be used to prevent phishing (8 marks)

Evaluate responses using AI:

OFF

4.

OPEN ENDED QUESTION

3 mins • 7 pts

Hackers sometimes commit fraud after causing spyware to be installed on other users’ computers.

(a) Describe what is meant by the term ‘spyware’ ( 3 marks)

(b)(b) Explain how a hacker uses the information gained from spyware to commit fraud.( 4 marks)

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

5 mins • 6 pts

Sensors are used in monitoring systems to measure physical variables. It is important that sensors are calibrated before use. (a) Describe, in detail, these sensors and give an appropriate use for each. Each use must be different.

a) Humidity (marks 2)

b)Sound (marks 2)

c) Explain the importance of calibration (marks 2)

Evaluate responses using AI:

OFF

6.

OPEN ENDED QUESTION

3 mins • 4 pts

Sensors are used in monitoring and control to measure physical variables. (a) Describe these sensors. For each sensor, explain how it could be used in a control system. Each system must be different.

a)Infrared ( marks 2)

b)Ultrasonic (marks 2)

Evaluate responses using AI:

OFF

7.

CLASSIFICATION QUESTION

5 mins • 4 pts

Organize these options into the right categories

Groups:

(a) trojan

,

(b) rootkit

,

(c) spyware

,

(d) virus

in this method peron drops usb so other can take it with curiosity and get victim

keylogger

it distinguish itself as a legitimate software

it is designed to spread much like human virus

enables to gain adminsitrative access

designed to gather information about your interactions with your computer

it infects new files

it looks harmless

8.

OPEN ENDED QUESTION

10 mins • 8 pts

Exaplin a real world example of control system against intruders? also make a flowchart to demonstrate how this broken glass detection control will operate?

Evaluate responses using AI:

OFF