Component 3 - Learning Aim B

Component 3 - Learning Aim B

11th Grade

40 Qs

quiz-placeholder

Similar activities

Excel 2016 Introduction

Excel 2016 Introduction

10th - 12th Grade

35 Qs

Have fun with quiz !

Have fun with quiz !

3rd Grade - University

39 Qs

Ujian IoT PTS 2024 45 Soal

Ujian IoT PTS 2024 45 Soal

11th Grade - University

45 Qs

sql basics vaishali

sql basics vaishali

11th - 12th Grade

36 Qs

PAT ADMINISTRASI SISTEM JARINGAN KELAS XI TKJ

PAT ADMINISTRASI SISTEM JARINGAN KELAS XI TKJ

11th Grade

40 Qs

01 - 06 handout

01 - 06 handout

11th Grade - University

35 Qs

કીન્નાથી કપાયેલી પતંગ - ગમ્મે ત્યાં જાય

કીન્નાથી કપાયેલી પતંગ - ગમ્મે ત્યાં જાય

KG - University

35 Qs

TIN HỌC KHỐI 5 HK1

TIN HỌC KHỐI 5 HK1

1st Grade - University

42 Qs

Component 3 - Learning Aim B

Component 3 - Learning Aim B

Assessment

Quiz

Computers

11th Grade

Practice Problem

Hard

Created by

Paul Carruthers

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Why are computing systems attacked?

Damage to the organization's public image, Financial loss, Data loss, Personal attack, Disruption
Intellectual property theft, Ransomware, Malware, Phishing, Social engineering
Algorithm, Database, Encryption, Programming, Artificial Intelligence
Virus protection, Firewall installation, Backup creation, Biometric authentication, Two-factor authentication
Hardware maintenance, Software updates, User training, Physical security measures, Password masking

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is Intellectual property​

The idea that you invented and belongs to you​
The act of getting users to share sensitive information through a false pretext.
A form of malware usually infecting unprotected digital systems​
A measure of effectiveness- how long it takes an employee to produce an item for sale.
A cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is Malware

A malicious form of software that is transferred to and then executed on​
A type of software designed to protect your computer system
A form of digital currency
A type of cloud storage service
An online shopping platform

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an example of Malware

Ransomware
Data Protection
Anti-virus
Accessibility Features
Acceptable Use Policy (AUP)

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Give Three common reasons for attacks on digital systems

Industrial espionage
Personal attack
Disruption
Intellectual property rights
Social media

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Give three reasons for a personal cyberattack on an organisation

Financial gain
Data and information theft
Disruption
To improve system performance
To improve a company's public image

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Two types of common disruption an organisation might experience through a cyberattack (Select Two)

Attacks can prevent an organization form operating normally
Causes operation chaos, loss of earnings and reputational damage
Heightened employee morale
Enhancement of customer satisfaction
System performance

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?