placeholder image to represent content

THIRD QUARTER SUMMATIVE TEST ICT 10

Quiz by Hera

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
25 questions
Show answers
  • Q1

    In May 2000 there are two Filipino people who spread the virus that caused widespread damage globally. what is the name of the virus?

    I Love You virus

    Open the love Letter for you

    Love Letter for you

    I Miss you Virus

    60s
  • Q2

    Who are the people responsible for the contribution and the creation  of the  said virus?

    Anton Tejero and Ramon de Gusman

    Ronel De Gosman and Romel Tehero

    Onel Tejero and Reomel de Guzman

    Onel de Guzman and Reomel M. Tejero

    60s
  • Q3

    As a future computer technician, you need to understand computer and network security. Which of the following does NOT belong to good security practices?

    Opening email attachments from unknown or untrusted sources.

    Regularly updating software and operating systems to patch vulnerabilities.

    Encrypting sensitive data both in transit and at rest.

    Using strong, unique passwords for different accounts and systems.

    60s
  • Q4

    What is phishing in the context of computer security?

    A type of computer virus

    An encryption method

    A firewall setting

    A technique used to trick users into providing sensitive information

    60s
  • Q5

    Why is computer security important for individuals and organizations?

    It helps to install new applications.

    It guarantees that all software is free.

    It protects sensitive data from unauthorized access and cyber threats.

    It makes computers run faster.

    60s
  • Q6

    Imagine you work for a company that stores sensitive customer data, including personal identification details and payment information. One day, your team notices that several of the computers have become unusually slow, and some employees can't access important files. Upon further investigation, it's discovered that the company's network was breached because proper security measures were not in place. The hackers gained access to the sensitive data and began selling it on the dark web.

    What should be the company's first step immediately after discovering the security breach?

    Contact the authorities and security experts to investigate the breach.

    Continue with normal operations to avoid causing panic.

    Publicly announce the breach on social media to warn customers immediately.

    Ignore the situation, hoping it will resolve itself.

    120s
  • Q7

    Which of the following is a key preventative measure the company should implement to avoid future breaches?

    use weak passwords for employees to simplify login access.

    Avoid using firewalls or encryption, as they can slow down systems.

    Rely solely on antivirus software to secure all systems.

    Regularly update security systems, software, and train employees on security protocols.

    120s
  • Q8

    Imagine you work for a company that stores sensitive customer data, including personal identification details and payment information. One day, your team notices that several of the computers have become unusually slow, and some employees can't access important files. Upon further investigation, it's discovered that the company's network was breached because proper security measures were not in place. The hackers gained access to the sensitive data and began selling it on the dark web.

    What are some of the common consequences your company might face due to this lack of computer security?

    The company will receive a reward for quickly identifying the breach and fixing the issue.

    The company's IT team will be able to quickly resolve the issue without any financial impact.

    The company will face no consequences, as hackers never use stolen data.

    The company will experience data theft, loss of customer trust, and possible legal consequences.

    120s
  • Q9

    Which of the following is a sign that your computer may be infected with malware?

    Quick loading times and no ads.

    Improved software performance.

    Unexpected pop-up ads and slow performance.

    Successful software updates.

    60s
  • Q10

    You receive a text message from a "service provider" you do not recognize, claiming you’ve won a prize and need to "claim your reward" by entering personal details into a website. The message includes a link and asks for sensitive information like your Social Security number and credit card details.

    How should you handle this text message?

    Click the link, but only provide non-sensitive information to be cautious.

    Visit the website right away to claim your reward.

    Respond to the text asking for more information about the prize.

    Ignore the text and delete it, as it’s likely a phishing attempt.

    120s
  • Q11

    Alex receives a message from what looks like their bank, claiming there’s an issue with their account. The email includes a link asking Alex to log in and "verify account information" to avoid suspension. The email seems urgent, and the sender's address looks similar to the bank's official domain, but there's a slight misspelling in the email address.

    What should Alex do in response to this email?

    Visit the bank’s official website directly and contact customer support to verify if the message is legitimate.

    Click the link immediately to verify the account information.

    Ignore the message and delete it since it might be a phishing attempt.

    Reply to the email to ask for more details before taking any action.

    120s
  • Q12

    What is phishing in the context of cybersecurity?

    A fraudulent attempt to obtain sensitive information by impersonating a trustworthy entity

    A procedure to back up data that can help you retrieve your deleted data.

    A method to secure Wi-Fi networks that secure your sensitive information.

    A type of antivirus software that can detect virus transfer.

    60s
  • Q13

    You are logging into your work account to access important documents. After entering your password, you are prompted to enter a unique code sent to your phone via text message. The system explains that this is an additional security measure to ensure that only you can access the account, even if someone else has your password.

    What is this process called, and why is it important for account security?

    It’s called encrypted login, and it protects your account from being hacked by using encryption on all devices.

    It’s called password complexity, and it’s important because it helps create stronger passwords for your account.

    It’s called two-factor authentication, and it provides an extra layer of security by requiring both something you know (password) and something you have (phone).

    It’s called multi-signature verification, and it’s important because it ensures that only authorized devices can access the account.

    60s
  • Q14

    A hacker remotely gains access to the company’s internal network and steals sensitive customer data, including credit card numbers and addresses. The hacker uses advanced tools to break into the system without being detected.

    What type of security attack is this, and how does it affect the company?

    It's a data security attack. The hacker accessed sensitive data, compromising customer privacy and potentially causing financial loss

    It's a brute force attack. The hacker cracked passwords using a high-speed process to gain access to the system.

    It's a physical security attack. The hacker physically broke into the office and accessed the computer network.

    It's a denial-of-service attack. The hacker overwhelmed the network, causing disruptions to the company's operations.

    120s
  • Q15

    A thief breaks into the company’s office, steals an employee’s laptop, and leaves the premises without being noticed. The laptop contains unencrypted personal data of employees, including social security numbers and home addresses.

    What type of security attack is this, and what could be the consequences for the company?

    It's a physical security attack. The thief gained unauthorized access to the office and took a device that contains personal data, risking a data breach.

    It's a man-in-the-middle attack. The thief intercepted communication between employees and compromised personal data.

    It's a ransomware attack. The thief used malware to encrypt the laptop data and demanded a ransom for decryption.

    It's a data security attack. The thief stole the laptop and potentially compromised sensitive data, leading to privacy issues.

    120s

Teachers give this quiz to your class