
1.5.4 - Starter Task/Cyber Resilience
Authored by Mike Roberts
Computers
11th Grade
Used 16+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Name THREE utility programs (3 points)
Defragmentation
Firewall
Backup
Compression
Anti-virus
Answer explanation
The correct utility programs are Firewall, Backup, and Anti-virus. These programs help protect the system from external threats, secure data, and prevent malware infections.
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Name THREE operating system tools (3 points)
User interface
Peripheral device management
User management
File management
Memory management
Answer explanation
The correct operating system tools are User interface, Peripheral device management, and File management.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a type of data storage technology?
Optical
Magnetic
Solid-state
Quantum
Answer explanation
The correct types of storage are Optical, Magnetic, and Solid-state as they are commonly used for storing data in various devices.
4.
OPEN ENDED QUESTION
3 mins • 1 pt
Name FOUR CPU registers (4 points)
Evaluate responses using AI:
OFF
Answer explanation
The correct answer is to name FOUR CPU registers: Program Counter (PC), Memory Address Register (MAR), Memory Data Register (MDR), and Accumulator (ACC).
5.
OPEN ENDED QUESTION
3 mins • 1 pt
Name TWO types of primary storage (4 points)
Evaluate responses using AI:
OFF
Answer explanation
The correct types of primary storage are RAM and ROM.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware will display unwanted pop-up ads? (2 points)
Adware
Spyware
Ransomware
Trojan horse
Answer explanation
Adware is the type of malware that displays unwanted pop-up ads, making it the correct choice in this scenario.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of threat floods servers with useless requests? (1 point)
DDoS Attack
Phishing attack
Ransomware attack
Malware attack
Answer explanation
DDoS Attack floods servers with useless requests, causing them to become overwhelmed and unavailable to legitimate users.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
12 questions
1.5.3 - Starter Tasks/Network Threats (Dg)
Quiz
•
11th Grade
12 questions
Seguridad informática: virus y antivirus
Quiz
•
9th - 12th Grade
10 questions
Google Forms
Quiz
•
11th Grade
15 questions
Creative iMedia Revision
Quiz
•
10th - 11th Grade
12 questions
AS: Standard application layer protocols
Quiz
•
11th Grade
17 questions
Binary Representation
Quiz
•
9th - 11th Grade
17 questions
Security and Ethics
Quiz
•
9th - 12th Grade
10 questions
Ethical Hacking 1
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
22 questions
El Imperfecto
Quiz
•
9th - 12th Grade
15 questions
ACT Reading Practice
Quiz
•
11th Grade
20 questions
SSS/SAS
Quiz
•
9th - 12th Grade
20 questions
verbos reflexivos en español
Quiz
•
9th - 12th Grade
14 questions
Making Inferences From Samples
Quiz
•
7th - 12th Grade
23 questions
CCG - CH8 Polygon angles and area Review
Quiz
•
9th - 12th Grade
8 questions
Momentum and Collisions
Lesson
•
9th - 12th Grade