Component 3 - Learning Aim B

Component 3 - Learning Aim B

11th Grade

40 Qs

quiz-placeholder

Similar activities

CompTIA Fundamentals Topic 1

CompTIA Fundamentals Topic 1

10th - 12th Grade

36 Qs

Data Security terms

Data Security terms

6th - 12th Grade

40 Qs

BTEC Revision 2

BTEC Revision 2

9th - 12th Grade

45 Qs

Unit 8 Cybersecurity Review

Unit 8 Cybersecurity Review

11th Grade

40 Qs

Understanding Security and Maintenance

Understanding Security and Maintenance

8th Grade - University

40 Qs

2. Cybersecurity Awareness(AIE)

2. Cybersecurity Awareness(AIE)

11th Grade

36 Qs

Email & Web Search Basics

Email & Web Search Basics

9th - 12th Grade

35 Qs

Online data security | Internet safety

Online data security | Internet safety

4th Grade - Professional Development

36 Qs

Component 3 - Learning Aim B

Component 3 - Learning Aim B

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Paul Carruthers

Used 1+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Why are computing systems attacked?
Damage to the organization's public image, Financial loss, Data loss, Personal attack, Disruption
Intellectual property theft, Ransomware, Malware, Phishing, Social engineering
Algorithm, Database, Encryption, Programming, Artificial Intelligence
Virus protection, Firewall installation, Backup creation, Biometric authentication, Two-factor authentication
Hardware maintenance, Software updates, User training, Physical security measures, Password masking

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is Intellectual property​
The idea that you invented and belongs to you​
The act of getting users to share sensitive information through a false pretext.
A form of malware usually infecting unprotected digital systems​
A measure of effectiveness- how long it takes an employee to produce an item for sale.
A cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is Malware
A malicious form of software that is transferred to and then executed on​
A type of software designed to protect your computer system
A form of digital currency
A type of cloud storage service
An online shopping platform

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an example of Malware
Ransomware
Data Protection
Anti-virus
Accessibility Features
Acceptable Use Policy (AUP)

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Give Three common reasons for attacks on digital systems
Industrial espionage
Personal attack
Disruption
Intellectual property rights
Social media

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Give three reasons for a personal cyberattack on an organisation
Financial gain
Data and information theft
Disruption
To improve system performance
To improve a company's public image

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Two types of common disruption an organisation might experience through a cyberattack (Select Two)

Attacks can prevent an organization form operating normally
Causes operation chaos, loss of earnings and reputational damage
Heightened employee morale
Enhancement of customer satisfaction
System performance

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?