AAT L4 INAC

AAT L4 INAC

Vocational training

10 Qs

quiz-placeholder

Similar activities

The Finquest

The Finquest

University

15 Qs

Week 2: Intro to Financial Management

Week 2: Intro to Financial Management

9th - 12th Grade

10 Qs

Soal OSK Ekonomi

Soal OSK Ekonomi

10th Grade

10 Qs

managerial finance

managerial finance

University

15 Qs

Balance Scorecard

Balance Scorecard

University

10 Qs

Menentukan Harga Pokok Penjualan

Menentukan Harga Pokok Penjualan

11th Grade

10 Qs

S3 Intro to Double Entry/Ledgers

S3 Intro to Double Entry/Ledgers

7th Grade

11 Qs

EVALUACIÓN PRIMER BIMESTRE - CONTABILIDAD SEGUNDO BÁSICO

EVALUACIÓN PRIMER BIMESTRE - CONTABILIDAD SEGUNDO BÁSICO

8th Grade

10 Qs

AAT L4 INAC

AAT L4 INAC

Assessment

Quiz

Financial Education

Vocational training

Practice Problem

Hard

Created by

Debbie Meredith

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of software could be installed on a computer to see what passwords are being used?

Spyware

Ransomware

Anti Virus

Password Cracker

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware encrypts the users hard drive and demands money for release?

Worm

Virus

Ransomware

Trojan Horse

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Passwords should be stored on a server?

True

False

Answer explanation

Passwords are never stored on servers. Instead we store Password Hashes - these are encrypted versions of our passwords that cannot be decrypted.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What piece of hardware could be installed which monitors incoming and outgoing traffic on a network?

Alarm

Virtual Machine

Firewall

Router

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following would be a suitable password

LiverpoolFC

123456790-123456790

ManufactureOrganisationFinance

M@nufacture0rganisationF1nance

Answer explanation

The correct answer is one which uses three words and replaces some characters with special ones.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When an email is received which looks genuine but is in fact bogus is known as what type of attack?

Pharming

Blagging

Fishing

Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A properly designed internal control system: 

Lowers the company's risk of loss
Insures profitable operations
Eliminates the need for an audit
Requires the use of non-computerized systems

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?