WJEC ICT - Chapter 3 - Data loss, theft and manipulation

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

10th Grade

11 Qs

quiz-placeholder

Similar activities

Empowerment Technologies Quiz 2

Empowerment Technologies Quiz 2

11th Grade

10 Qs

Chapter 3 Exploring Linux Filesystems

Chapter 3 Exploring Linux Filesystems

11th Grade - University

10 Qs

IP ADDRESSING AND ITS VERSION

IP ADDRESSING AND ITS VERSION

11th Grade

15 Qs

Networks and Internet

Networks and Internet

10th Grade

10 Qs

Graphs

Graphs

University

15 Qs

Adobe Photoshop

Adobe Photoshop

University

10 Qs

VR and AR in multimedia applications

VR and AR in multimedia applications

University

10 Qs

OOP 1 Undiksha

OOP 1 Undiksha

12th Grade - University

13 Qs

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

WJEC ICT - Chapter 3 - Data loss, theft and manipulation

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Jordan Firth

Used 6+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which prevention strategy would commonly be used to deal with power outages?

Staff training

Anti-malware software

Encryption

Uninterruptible power supplies (UPS)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A software developer has had some code stolen by a competitor. What are the implications of this?

Loss of service

Breach of GDPR

Blackmail

Competitor advantage

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which prevention strategy is commonly used to prevent data interception?

Change backup schedules

Locks

Anti-malware software

Encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a website is down for 24 hours and customers are unable to access it, what are the financial implications?

Loss of sales/revenues

Fines to regulators

Compensation to customers due to breaking the law

Discounted prices for poor customer service

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Customers are angry that a company could not keep their data safe and have problems trusting them in the future, it could also lead to negative reviews online. Identify the potential implication of this.

Blackmail

Loss of reputation

Loss of service

Breach of GDPR

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term would be used to describe a hacker that is demanding a company pays £10,000 so they can regain access to important customer data?

Competitor advantage

Loss of reputation

Blackmail/ransom

Loss of service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A website is down for 24 hours and customers are unable to access it, leading to a loss in sales. What are the implications of this?

Breach of GDPR

Blackmail

Competitor advantage

Loss of service

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?