Component 3 - Learning Aim B

Component 3 - Learning Aim B

11th Grade

40 Qs

quiz-placeholder

Similar activities

2019 Review - III, IGCSE CS 0478 - dfm

2019 Review - III, IGCSE CS 0478 - dfm

9th - 12th Grade

42 Qs

ITGS_12_QUIZ-02

ITGS_12_QUIZ-02

11th - 12th Grade

40 Qs

ICT Unit 2 Quiz

ICT Unit 2 Quiz

11th Grade

35 Qs

INFORMATIKA

INFORMATIKA

11th Grade

40 Qs

Empowerment Technology Quiz

Empowerment Technology Quiz

11th Grade

40 Qs

Comptia A+ Review

Comptia A+ Review

10th Grade - Professional Development

40 Qs

SOAL AIJ XII TKJ

SOAL AIJ XII TKJ

11th - 12th Grade

40 Qs

Last Review-Fall 2021

Last Review-Fall 2021

9th Grade - University

45 Qs

Component 3 - Learning Aim B

Component 3 - Learning Aim B

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Paul Carruthers

Used 1+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Why are computing systems attacked?
Damage to the organization's public image, Financial loss, Data loss, Personal attack, Disruption
Intellectual property theft, Ransomware, Malware, Phishing, Social engineering
Algorithm, Database, Encryption, Programming, Artificial Intelligence
Virus protection, Firewall installation, Backup creation, Biometric authentication, Two-factor authentication
Hardware maintenance, Software updates, User training, Physical security measures, Password masking

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is Intellectual property​
The idea that you invented and belongs to you​
The act of getting users to share sensitive information through a false pretext.
A form of malware usually infecting unprotected digital systems​
A measure of effectiveness- how long it takes an employee to produce an item for sale.
A cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is Malware
A malicious form of software that is transferred to and then executed on​
A type of software designed to protect your computer system
A form of digital currency
A type of cloud storage service
An online shopping platform

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an example of Malware
Ransomware
Data Protection
Anti-virus
Accessibility Features
Acceptable Use Policy (AUP)

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Give Three common reasons for attacks on digital systems
Industrial espionage
Personal attack
Disruption
Intellectual property rights
Social media

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Give three reasons for a personal cyberattack on an organisation
Financial gain
Data and information theft
Disruption
To improve system performance
To improve a company's public image

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Two types of common disruption an organisation might experience through a cyberattack (Select Two)

Attacks can prevent an organization form operating normally
Causes operation chaos, loss of earnings and reputational damage
Heightened employee morale
Enhancement of customer satisfaction
System performance

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?