Threats To Ict Systems

10 Questions  I  By 2dsm
Please take the quiz to rate it.

Ict Quizzes & Trivia
Threats to ICT systems - AS Level

  
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 
    Which of the following would be an example of malpractice?
    • A. 

      When an employee goes against the company ICT code of practice e.g leaving workstation logged on

    • B. 

      When individuals or organisations break the law through using computers illegally access a computer system

    • C. 

      A piece of malicious code that is written by programmers and is used to corrupt data and systems.


  • 2. 
    Which of the following would be an example of crime in regards to ICT systems?
    • A. 

      When individuals or organisations break the law through using computers illegally access a computer system

    • B. 

      A piece of malicious code that is written by programmers and is used to corrupt data and systems.

    • C. 

      When an employee goes against the company ICT code of practice e.g leaving workstation logged on


  • 3. 
    Which of the following would best describe a virus?
    • A. 

      When individuals or organisations break the law through using computers illegally access a computer system

    • B. 

      A piece of malicious code that is written by programmers and is used to corrupt data and systems.

    • C. 

      When an employee goes against the company ICT code of practice e.g leaving workstation logged on


  • 4. 
    Which of the following would best describe a firewall?
    • A. 

      A barrier between the internet and a private computer that blocks threats such as viruses

    • B. 

      A mechanism that is designed to detect, prevent or recover from a security threat

    • C. 

      A service that enhances the security of the data-processing systems and the data transfers of an organisation


  • 5. 
    Anti-Virus software is installed on systems to detect and delete viruses. Which of the following are a type of virus?
    • A. 

      Snake

    • B. 

      Worm

    • C. 

      Toad

    • D. 

      Trojan

    • E. 

      Horse


  • 6. 
    Which law regulates how personal data is used and protects data subjects from the misuse of their personal data?
    • A. 

      Computer Misuse Act

    • B. 

      Data protection Act 1996

    • C. 

      Data Protection Act 1998

    • D. 

      Copyright, Designs and Patents Act 1988


  • 7. 
    Which law prevents unauthorised access to computer systems?
    • A. 

      Data protection Act 1996

    • B. 

      Computer Misuse Act

    • C. 

      Copyright, Designs and Patents Act 1988

    • D. 

      Data Protection Act 1998


  • 8. 
    Which law prevents unauthorised copying of software code?
    • A. 

      Data Protection Act 1998

    • B. 

      Copyright, Designs and Patents Act 1988

    • C. 

      Computer Misuse Act


  • 9. 
    One way data can be protected is to use:
    • A. 

      Bubble wrap

    • B. 

      Encryption

    • C. 

      Email Attachments


  • 10. 
    A security attack would best be described as:
    • A. 

      Any action that compromises the security of data held by and organisation

    • B. 

      Any action that compromises the security of critical data held by and organisation


Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.