Paper 1 Mock Test 1 Part B2
Paper 1 Mock Test 1 Part B2
QUESTION-ANSWER SECTION
PART B2
44 What does the phrase 'had the rug pulled out from under it' in line9 hean?
A. los its momentum suddenly
B. ostits momentum gradually
C gained its momentum suddenly A B D
45. According to paragraph 3/what did the security researcher from Britain achieve with respect to the spread of
WannaCry? And what did he not? (2 marks)
Achieved:
46. Find aword in paragrap that suggests the spread of WannaCry was stopped by acident.
in ad verf ently
47.
Based on the information given in paragrapks 4and Seomplete the following flow chart showing how the WannaCry
program works. UKe ONEWord for each blank. (9 marks)
The result is
Data risks being
(vii) uncear (ix)
Lnaypted
forever.
50. Read paragrapt\ 7/dentity the TwO ypes of organizations mentioned that are most aflected by ransomware attacks.
and the reasons. (4 marks)
S2. Based on the information given in paragraph 8,)does the writer think cyber erimes are likelyto be an evolving threat?
Sypport you, answer with evidence from the same paragraph. (2 marks)
54. Complete the fact sheet below about ransomware using information given in the text. (7 marks)
SamSam not given demanding (vii) hgh ratu to anlet the Re.
returning files to their victims
55.
What does the writer imply when be/she wites 'about half the time, the major risk factor is not the strength of your
sottware systems, but the strength of your decision-making' (lines 41-42)?
A. Choosing experienced hackers is the key to launching successful cyber attacks.
B. Choosing vulnerable tangets is the key to launching
successfulcyber attacks.
C. Choosing which tiles and links to open is the key to
avoiding cyber attacks. A B D
D. Choosing a powerful operating system is the key to
avoiding cyber attacks.
0. DeCIde whether the following statements are True (T), False (F), or if the information is Not
Given (NG) in paragraph
11. Blacken ONE circle only for
each statement. (3 marks)
T NG
Nowadays data recovery professionals charge unreasonably large fees than
hackers for retrieving data.
i1) Some ransomware programs are almost impossible to
combat, leaving data
recovery professionals at a standstill.
iM) Ransomware writers are trying to gain access to victims' computer
systems
through false device requests.
END OF PART B2