Search Header Logo

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

Authored by Jordan Firth

Computers

10th Grade

Used 9+ times

WJEC ICT - Chapter 3 - Data loss, theft and manipulation
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which prevention strategy would commonly be used to deal with power outages?

Staff training

Anti-malware software

Encryption

Uninterruptible power supplies (UPS)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software developer has had some code stolen by a competitor. What are the implications of this?

Loss of service

Breach of GDPR

Blackmail

Competitor advantage

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which prevention strategy is commonly used to prevent data interception?

Change backup schedules

Locks

Anti-malware software

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a website is down for 24 hours and customers are unable to access it, what are the financial implications?

Loss of sales/revenues

Fines to regulators

Compensation to customers due to breaking the law

Discounted prices for poor customer service

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Customers are angry that a company could not keep their data safe and have problems trusting them in the future, it could also lead to negative reviews online. Identify the potential implication of this.

Blackmail

Loss of reputation

Loss of service

Breach of GDPR

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term would be used to describe a hacker that is demanding a company pays £10,000 so they can regain access to important customer data?

Competitor advantage

Loss of reputation

Blackmail/ransom

Loss of service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A website is down for 24 hours and customers are unable to access it, leading to a loss in sales. What are the implications of this?

Breach of GDPR

Blackmail

Competitor advantage

Loss of service

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?