Related Topics
Take Another Quiz

Threats To Ict Systems

10 Questions
Ict Quizzes & Trivia

Threats to ICT systems - AS Level

Questions and Answers
  • 1. 
    Which of the following would be an example of malpractice?
    • A. 

      When an employee goes against the company ICT code of practice e.g leaving workstation logged on

    • B. 

      When individuals or organisations break the law through using computers illegally access a computer system

    • C. 

      A piece of malicious code that is written by programmers and is used to corrupt data and systems.

  • 2. 
    Which of the following would be an example of crime in regards to ICT systems?
    • A. 

      When individuals or organisations break the law through using computers illegally access a computer system

    • B. 

      A piece of malicious code that is written by programmers and is used to corrupt data and systems.

    • C. 

      When an employee goes against the company ICT code of practice e.g leaving workstation logged on

  • 3. 
    Which of the following would best describe a virus?
    • A. 

      When individuals or organisations break the law through using computers illegally access a computer system

    • B. 

      A piece of malicious code that is written by programmers and is used to corrupt data and systems.

    • C. 

      When an employee goes against the company ICT code of practice e.g leaving workstation logged on

  • 4. 
    Which of the following would best describe a firewall?
    • A. 

      A barrier between the internet and a private computer that blocks threats such as viruses

    • B. 

      A mechanism that is designed to detect, prevent or recover from a security threat

    • C. 

      A service that enhances the security of the data-processing systems and the data transfers of an organisation

  • 5. 
    Anti-Virus software is installed on systems to detect and delete viruses. Which of the following are a type of virus?
    • A. 

      Snake

    • B. 

      Worm

    • C. 

      Toad

    • D. 

      Trojan

    • E. 

      Horse

  • 6. 
    Which law regulates how personal data is used and protects data subjects from the misuse of their personal data?
    • A. 

      Computer Misuse Act

    • B. 

      Data protection Act 1996

    • C. 

      Data Protection Act 1998

    • D. 

      Copyright, Designs and Patents Act 1988

  • 7. 
    Which law prevents unauthorised access to computer systems?
    • A. 

      Data protection Act 1996

    • B. 

      Computer Misuse Act

    • C. 

      Copyright, Designs and Patents Act 1988

    • D. 

      Data Protection Act 1998

  • 8. 
    Which law prevents unauthorised copying of software code?
    • A. 

      Data Protection Act 1998

    • B. 

      Copyright, Designs and Patents Act 1988

    • C. 

      Computer Misuse Act

  • 9. 
    One way data can be protected is to use:
    • A. 

      Bubble wrap

    • B. 

      Encryption

    • C. 

      Email Attachments

  • 10. 
    A security attack would best be described as:
    • A. 

      Any action that compromises the security of data held by and organisation

    • B. 

      Any action that compromises the security of critical data held by and organisation

Related Topics