BM2 Unit 4 Review

BM2 Unit 4 Review

9th - 12th Grade

25 Qs

quiz-placeholder

Similar activities

BF10 BE Unit 5 Test

BF10 BE Unit 5 Test

9th - 12th Grade

20 Qs

BMII Unit 4 Practice Test

BMII Unit 4 Practice Test

8th Grade - University

20 Qs

BM 2 Unit 4 Quiz

BM 2 Unit 4 Quiz

12th Grade

20 Qs

Business Plan

Business Plan

9th - 12th Grade

24 Qs

POBF Money Matters 6.02

POBF Money Matters 6.02

9th - 12th Grade

20 Qs

Business Essentials Unit 5

Business Essentials Unit 5

9th - 12th Grade

20 Qs

ESB Vocabulary Quiz 2

ESB Vocabulary Quiz 2

9th - 12th Grade

20 Qs

Marketing Plan

Marketing Plan

11th - 12th Grade

20 Qs

BM2 Unit 4 Review

BM2 Unit 4 Review

Assessment

Quiz

Business

9th - 12th Grade

Hard

Created by

Angela Royster

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a trade secret?

A public business strategy available to all competitors.

Confidential business information that provides a competitive advantage.

A government-mandated security practice.

A method for encrypting customer data.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which cyber threat involves attackers impersonating legitimate sources to steal information?

Data governance

Phishing

Access control

Information system failure

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does "big data" influence business decision-making?

It replaces the need for managers to make decisions.

It provides large sets of structured and unstructured data for analysis.

It prevents competitors from accessing information.

It reduces the amount of data collected by businesses.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company has implemented policies that restrict who can access specific customer information. What security measure is this?

Trade secrets

Access control

Copyright protection

Phishing prevention

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of business asset includes literary works and trademarks?

Intellectual property

Data governance

Information flow

Encryption

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following incidents is an example of a data breach?

A manager encrypting employee records.

A hacker gaining unauthorized access to customer information.

A company legally selling customer data to another business.

A company deleting old records according to policy.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A company establishes a data retention policy. What is its primary function?

To ensure secure storage and proper disposal of business data.

To allow employees to delete customer records freely.

To store trade secrets indefinitely.

To provide free access to all company data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?