BM2 Unit 4 Review

BM2 Unit 4 Review

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

Market Research

Market Research

9th - 12th Grade

20 Qs

Qualitative vs Quantitative

Qualitative vs Quantitative

9th - 12th Grade

20 Qs

Business and Technology-Standard 2 and Standard 3 Test

Business and Technology-Standard 2 and Standard 3 Test

9th - 12th Grade

20 Qs

Business Activities

Business Activities

9th - 12th Grade

20 Qs

QuickBooks Online Review- 1

QuickBooks Online Review- 1

11th - 12th Grade

20 Qs

BE Lesson 3.01

BE Lesson 3.01

9th - 12th Grade

20 Qs

Business Essentials, Unit 5

Business Essentials, Unit 5

9th Grade

24 Qs

Marketing Research JC

Marketing Research JC

9th - 12th Grade

23 Qs

BM2 Unit 4 Review

BM2 Unit 4 Review

Assessment

Quiz

Business

9th - 12th Grade

Hard

Created by

Angela Royster

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a trade secret?

A public business strategy available to all competitors.

Confidential business information that provides a competitive advantage.

A government-mandated security practice.

A method for encrypting customer data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cyber threat involves attackers impersonating legitimate sources to steal information?

Data governance

Phishing

Access control

Information system failure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does "big data" influence business decision-making?

It replaces the need for managers to make decisions.

It provides large sets of structured and unstructured data for analysis.

It prevents competitors from accessing information.

It reduces the amount of data collected by businesses.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company has implemented policies that restrict who can access specific customer information. What security measure is this?

Trade secrets

Access control

Copyright protection

Phishing prevention

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of business asset includes literary works and trademarks?

Intellectual property

Data governance

Information flow

Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following incidents is an example of a data breach?

A manager encrypting employee records.

A hacker gaining unauthorized access to customer information.

A company legally selling customer data to another business.

A company deleting old records according to policy.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company establishes a data retention policy. What is its primary function?

To ensure secure storage and proper disposal of business data.

To allow employees to delete customer records freely.

To store trade secrets indefinitely.

To provide free access to all company data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?