1.5.4 - Starter Task/Cyber Resilience

Quiz
•
Computers
•
11th Grade
•
Medium
Mike Roberts
Used 16+ times
FREE Resource
12 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Name THREE utility programs (3 points)
Defragmentation
Firewall
Backup
Compression
Anti-virus
Answer explanation
The correct utility programs are Firewall, Backup, and Anti-virus. These programs help protect the system from external threats, secure data, and prevent malware infections.
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Name THREE operating system tools (3 points)
User interface
Peripheral device management
User management
File management
Memory management
Answer explanation
The correct operating system tools are User interface, Peripheral device management, and File management.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a type of data storage technology?
Optical
Magnetic
Solid-state
Quantum
Answer explanation
The correct types of storage are Optical, Magnetic, and Solid-state as they are commonly used for storing data in various devices.
4.
OPEN ENDED QUESTION
3 mins • 1 pt
Name FOUR CPU registers (4 points)
Evaluate responses using AI:
OFF
Answer explanation
The correct answer is to name FOUR CPU registers: Program Counter (PC), Memory Address Register (MAR), Memory Data Register (MDR), and Accumulator (ACC).
5.
OPEN ENDED QUESTION
3 mins • 1 pt
Name TWO types of primary storage (4 points)
Evaluate responses using AI:
OFF
Answer explanation
The correct types of primary storage are RAM and ROM.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware will display unwanted pop-up ads? (2 points)
Adware
Spyware
Ransomware
Trojan horse
Answer explanation
Adware is the type of malware that displays unwanted pop-up ads, making it the correct choice in this scenario.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of threat floods servers with useless requests? (1 point)
DDoS Attack
Phishing attack
Ransomware attack
Malware attack
Answer explanation
DDoS Attack floods servers with useless requests, causing them to become overwhelmed and unavailable to legitimate users.
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Post Assessment - Cybersecurity Awareness

Quiz
•
9th Grade - Professio...
14 questions
1.2.4. Data Storage - representing images

Quiz
•
9th - 11th Grade
10 questions
Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Quiz
•
9th Grade - University
10 questions
Cyber Security

Quiz
•
8th - 12th Grade
15 questions
BTEC Digital Information Technology: Component 2 - Learning Aim A

Quiz
•
9th - 11th Grade
15 questions
Quis Keamanan Data

Quiz
•
10th Grade - University
10 questions
Internet security

Quiz
•
11th - 12th Grade
14 questions
cyber security

Quiz
•
KG - Professional Dev...
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade