Lesson 2: Internal Threats and Impacts

Lesson 2: Internal Threats and Impacts

9th - 12th Grade

15 Qs

quiz-placeholder

Similar activities

Tech+ 3.1 Reading Assessment

Tech+ 3.1 Reading Assessment

10th Grade

18 Qs

Maintaining and Repairing Computer Systems and Networks

Maintaining and Repairing Computer Systems and Networks

12th Grade

10 Qs

Quiz tentang Arduino dan Raspberry Pi

Quiz tentang Arduino dan Raspberry Pi

11th Grade - University

20 Qs

Lesson 3: Impact of IT systems

Lesson 3: Impact of IT systems

9th - 12th Grade

15 Qs

Lesson 3: Equal Access

Lesson 3: Equal Access

9th - 12th Grade

15 Qs

Lesson 1: System Attacks and External Threats

Lesson 1: System Attacks and External Threats

9th - 12th Grade

15 Qs

Lesson 5: Data Protection

Lesson 5: Data Protection

9th - 12th Grade

15 Qs

QUIZ PENGEMBANGAN PERANGKAT LUNAK DAN GIM

QUIZ PENGEMBANGAN PERANGKAT LUNAK DAN GIM

10th Grade - University

15 Qs

Lesson 2: Internal Threats and Impacts

Lesson 2: Internal Threats and Impacts

Assessment

Quiz

Information Technology (IT)

9th - 12th Grade

Hard

Created by

Ronnie Adom

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is overriding security controls?

A) Strengthening firewalls

B) Disabling security measures

C) Updating antivirus software

D) Using complex passwords

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why might employees override security?

A) To bypass restrictions

B) To improve security

C) To prevent hacking

D) To update policies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What risk does overriding security cause?

A) Faster system updates

B) Increased vulnerabilities

C) Improved efficiency

D) Reduced hacking risks

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can prevent unauthorised security changes?

A) Strong access policies

B) Removing all passwords

C) Sharing login details

D) Using default settings

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are USB drives a security risk?

A) They encrypt all data

B) They can spread malware

C) They boost performance

D) They prevent data leaks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which action helps prevent security overrides?

A) Removing admin controls

B) Restricting user access

C) Allowing open networks

D) Disabling security logs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What security risk comes from USB devices?

A) Improved encryption

B) Data theft or malware

C) Automatic virus removal

D) Faster file transfers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?