Threats To ICT System! Trivia Quiz

16 Questions | Total Attempts: 152

SettingsSettingsSettings
Threats To ICT System! Trivia Quiz - Quiz

.


Questions and Answers
  • 1. 
    What is a type of virus?
    • A. 

      Horse

    • B. 

      Snake

    • C. 

      Pig

    • D. 

      Worm

  • 2. 
    Is spam a threat to an ICT system?
    • A. 

      True

    • B. 

      False

  • 3. 
    Name three threats to an ICT system.
    • A. 

      Trojans

    • B. 

      Fire

    • C. 

      Animals

    • D. 

      Abuse by Staff

    • E. 

      Incorrect attire

    • F. 

      Misspelling

  • 4. 
    Can lighting strikes cause loss of power
    • A. 

      True

    • B. 

      False

  • 5. 
    Where can threats come from?
    • A. 

      Email

    • B. 

      Keyboard

    • C. 

      Clothes

    • D. 

      Mice

  • 6. 
    Which of the following would be an example of malpractice?
    • A. 

      When an employee goes against the company ICT code of practice e.g leaving workstation logged on

    • B. 

      When individuals or organisations break the law through using computers illegally access a computer system

    • C. 

      A piece of malicious code that is written by programmers and is used to corrupt data and systems.

  • 7. 
    Which of the following would be an example of crime in regards to ICT systems?
    • A. 

      When an employee goes against the company ICT code of practice e.g leaving workstation logged on

    • B. 

      A piece of malicious code that is written by programmers and is used to corrupt data and systems.

    • C. 

      When individuals or organisations break the law through using computers illegally access a computer system

  • 8. 
    Which of the following would best describe a virus?
    • A. 

      When individuals or organisations break the law through using computers illegally access a computer system

    • B. 

      A piece of malicious code that is written by programmers and is used to corrupt data and systems.

    • C. 

      When an employee goes against the company ICT code of practice e.g leaving workstation logged on

  • 9. 
    Which of the following would best describe a firewall?
    • A. 

      A mechanism that is designed to detect, prevent or recover from a security threat

    • B. 

      A barrier between the internet and a private computer that blocks threats such as viruses

    • C. 

      A service that enhances the security of the data-processing systems and the data transfers of an organisation

  • 10. 
    Which law regulates how personal data is used and protects data subjects from the misuse of their personal data?
    • A. 

      Data protection Act 1996

    • B. 

      Data Protection Act 1998

    • C. 

      Computer Misuse Act

    • D. 

      Copyright, Designs and Patents Act 1988

  • 11. 
    Which law prevents unauthorized access to computer systems?
    • A. 

      Data protection Act 1996

    • B. 

      Data Protection Act 1998

    • C. 

      Computer Misuse Act

    • D. 

      Copyright, Designs and Patents Act 1988

  • 12. 
    Which law prevents unauthorized copying of software code?
    • A. 

      Copyright, Designs and Patents Act 1988

    • B. 

      Data Protection Act 1998

    • C. 

      Computer Misuse Act

  • 13. 
    What are examples of malpractice?
    • A. 

      Not taking backup copies

    • B. 

      Logging off

    • C. 

      Not turning the screen off after shutting down

    • D. 

      Not turning off the computer

    • E. 

      Not scanning for virus

    • F. 

      Accidentally deleting data

  • 14. 
    Is software piracy malpractice?
    • A. 

      True

    • B. 

      False

  • 15. 
    Is logging onto Facebook whilst a work, malpractice?
    • A. 

      True

    • B. 

      False

  • 16. 
    What are the examples of crime?
    • A. 

      Fraud

    • B. 

      Theft of hardware

    • C. 

      Giving log in details out

    • D. 

      Destruction of data

    • E. 

      Hacking

    • F. 

      Viewing inappropriate material

Back to Top Back to top