
L2 ICT U1 Types of Threat Quiz
Authored by Sara Burton
Computers
11th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
16 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a cause of accidental damage to computer systems?
Natural disasters such as fire and flooding
Mishaps by users due to lack of training
Malicious software installed by hackers
Spilling a drink on the computer system
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can be the impact of a natural disaster like flooding on computer systems?
Temporary loss of internet connectivity
Increased efficiency of the computer systems
Huge damage to the computer systems and potential data loss
Automatic data backup to the cloud
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What might happen if employees are not given proper training on the appropriate use of computer systems?
They might receive promotions
They might cause great damage to computer systems
They might develop new software
They might improve the security of the systems
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an example of a mundane incident that can cause accidental damage to a computer system?
Writing a new computer program
Installing a new operating system
Spilling a drink on the computer system
Upgrading the computer hardware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does Malware stand for?
Malicious Hardware
Malicious Software
Malfunctioning Software
Malfunctioning Hardware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can malicious software programs often be gained?
From email attachments and downloading files from the internet or an external storage device
By visiting legitimate websites only
Through physical contact with infected devices
By updating the computer system regularly
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common way that viruses spread on a computer system?
By staying dormant and undetected
By duplicating and attaching themselves to other files and programs
By displaying advertisements
By encrypting files and demanding a ransom
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?