Cybersecurity - Software Security
Quiz
•
Computers
•
12th Grade
•
Practice Problem
•
Medium
Shamini Johnrose
Used 4+ times
FREE Resource
Enhance your content in a minute
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The designers of a new banking app believe that new clients should not only enter their client number and
password but also a verification code, and scan one of their fingerprints to sign into their account.
This security measure is best described as
general authentication.
two-factor authentication.
multi-factor authentication.
single-factor authentication.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Characteristics of data that has integrity include
authenticity, clarity and relevance.
accuracy, clarity and completeness.
accuracy, relevance and readability.
accuracy, reasonableness and relevance.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Actual data sets are not used to test software. Data sets are manufactured to test software.
If a manufactured data set was accidentally stored with an actual data set, what characteristic of data integrity would be most undermined by this mix-up?
value
timeliness
authenticity
reasonableness
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which one of the following best represents an ethical, but not legal, issue that may arise during the software development process?
using customer data for personal financial gain
incorporating addictive design elements in a children’s online learning application
collecting sensitive data during a survey without the participant knowing what the data will be used for
using code from a similar piece of software without the permission of the original developer
5.
MULTIPLE SELECT QUESTION
1 min • 1 pt
SeeMePoze is a new social media app. The following information was posted on the developer’s website:
‘SeeMePoze allows a diverse range of users to share their creativeness with the rest of the world through its
distinctive editing features. Get Pozing!’ This information is an example of
a marketing strategy.
a goal of an information system.
an objective of an information system.
a mission statement of an organisation.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is not a likely threat to the software assets of an organisation?
Malware
Theft
7.
OPEN ENDED QUESTION
1 min • 1 pt
List three ways of securing a building with IT resources.
Evaluate responses using AI:
OFF
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
20 questions
Latihan PSAS Kelas 9
Quiz
•
9th Grade - University
18 questions
12AIT - All About W3C <3
Quiz
•
10th Grade - University
15 questions
MVC-PHP
Quiz
•
12th Grade
16 questions
AI Checkpoint 1 Revision
Quiz
•
9th - 12th Grade
20 questions
NP IT Quiz ปริศนาไอที #4
Quiz
•
9th - 12th Grade
18 questions
Αναπαράσταση Χαρακτήρων
Quiz
•
11th - 12th Grade
15 questions
Cyber Security KS4
Quiz
•
8th - 12th Grade
15 questions
Excel
Quiz
•
10th - 12th Grade
Popular Resources on Wayground
10 questions
Honoring the Significance of Veterans Day
Interactive video
•
6th - 10th Grade
9 questions
FOREST Community of Caring
Lesson
•
1st - 5th Grade
10 questions
Exploring Veterans Day: Facts and Celebrations for Kids
Interactive video
•
6th - 10th Grade
19 questions
Veterans Day
Quiz
•
5th Grade
14 questions
General Technology Use Quiz
Quiz
•
8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Circuits, Light Energy, and Forces
Quiz
•
5th Grade
19 questions
Thanksgiving Trivia
Quiz
•
6th Grade
