Component 3 - Learning Aim B

Component 3 - Learning Aim B

11th Grade

40 Qs

quiz-placeholder

Similar activities

Sistema Operativo

Sistema Operativo

8th Grade - University

40 Qs

T4 ANIMASI 2D XI DKV

T4 ANIMASI 2D XI DKV

9th - 12th Grade

40 Qs

1 teori kejuruan TKJ

1 teori kejuruan TKJ

10th - 12th Grade

40 Qs

AP Computer Science Principles Units 1, 2 & 3

AP Computer Science Principles Units 1, 2 & 3

10th - 12th Grade

44 Qs

SIMKOMDIG

SIMKOMDIG

11th Grade

39 Qs

Excel

Excel

1st Grade - University

40 Qs

Pemodelan Perangkat Lunak

Pemodelan Perangkat Lunak

11th - 12th Grade

40 Qs

Soal Sumatif 1_v2 - HTML - Fase F

Soal Sumatif 1_v2 - HTML - Fase F

11th Grade

40 Qs

Component 3 - Learning Aim B

Component 3 - Learning Aim B

Assessment

Quiz

Computers

11th Grade

Practice Problem

Hard

Created by

Paul Carruthers

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Why are computing systems attacked?

Damage to the organization's public image, Financial loss, Data loss, Personal attack, Disruption
Intellectual property theft, Ransomware, Malware, Phishing, Social engineering
Algorithm, Database, Encryption, Programming, Artificial Intelligence
Virus protection, Firewall installation, Backup creation, Biometric authentication, Two-factor authentication
Hardware maintenance, Software updates, User training, Physical security measures, Password masking

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is Intellectual property​

The idea that you invented and belongs to you​
The act of getting users to share sensitive information through a false pretext.
A form of malware usually infecting unprotected digital systems​
A measure of effectiveness- how long it takes an employee to produce an item for sale.
A cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is Malware

A malicious form of software that is transferred to and then executed on​
A type of software designed to protect your computer system
A form of digital currency
A type of cloud storage service
An online shopping platform

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an example of Malware

Ransomware
Data Protection
Anti-virus
Accessibility Features
Acceptable Use Policy (AUP)

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Give Three common reasons for attacks on digital systems

Industrial espionage
Personal attack
Disruption
Intellectual property rights
Social media

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Give three reasons for a personal cyberattack on an organisation

Financial gain
Data and information theft
Disruption
To improve system performance
To improve a company's public image

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Two types of common disruption an organisation might experience through a cyberattack (Select Two)

Attacks can prevent an organization form operating normally
Causes operation chaos, loss of earnings and reputational damage
Heightened employee morale
Enhancement of customer satisfaction
System performance

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?