0% found this document useful (0 votes)
83 views4 pages

Paper 1 Mock Test 1 Part B2

Uploaded by

Edison
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views4 pages

Paper 1 Mock Test 1 Part B2

Uploaded by

Edison
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Developing Skills for HKDSE-Papers 1&2 Set B

Book 4 (2021 Revised Edition) Mock Test 1 Paper 1 -for HKDSE .

QUESTION-ANSWER SECTION

PART B2

Read Text 3 and answer questions 43-58. (4l marks)

43. According to paragraph, what is the security experts' major çoncern?)


A. Ransomware attacks are an increasingly widespread form of threat on the Internet.
B. Ransomware infections go unchecked while kill-all switches are being developed.
C Ransomware programs willsoon take complete control of computers worldwide? D
B
D. Cyber criminals have taken control of computers in Europe and Asia. X

44 What does the phrase 'had the rug pulled out from under it' in line9 hean?
A. los its momentum suddenly
B. ostits momentum gradually
C gained its momentum suddenly A B D

D. gained its momentum gradually>

45. According to paragraph 3/what did the security researcher from Britain achieve with respect to the spread of
WannaCry? And what did he not? (2 marks)

Achieved:

ii) Not achieved:

46. Find aword in paragrap that suggests the spread of WannaCry was stopped by acident.
in ad verf ently

© Aristo Educational Press Ltd. 2021 9


AMark Tes

Developing Skills for HKDSE - Papers 1&2 Set B


Book 4 (2021 Revised Edition) Mock Test 1 Paper 1 -for HKDSE

47.
Based on the information given in paragrapks 4and Seomplete the following flow chart showing how the WannaCry
program works. UKe ONEWord for each blank. (9 marks)

WannaCry uses (i) Yan Som ware


computer.
to seize control of the (ii) tiles on a

The vicim is asked to pay a ransom to (ii1)


finishes.
anlock the computer before the

The victim makes a (v)


transacten
I
in Bitcoip, a hard-to-trace (vi) digtal
currency that makes it difficult for authorities to (vi) Trac down the hackers.

Ransom paid No ransom paid

The result is
Data risks being
(vii) uncear (ix)
Lnaypted
forever.

48. Based on the information given in paragraphs 5and, which of the


following statements is(INCORRECT?
A. Victims generally hold the view
that SamSam will recover their files
eventually. V
B. The ransom demanded by
WannaCry was disproportionate to the value of the encrypted data.
C. The hackers behind WannaCry
would reliably decrypt victims' data eventually
D. Cyber criminals collected much A C
more in ransoms in 2016 than the year
before.O
49. What is the writer's tone in the statement 'a brand power of
sorts, of all absurdities'? (lines 22-23)?
A excited
B
sarcastic
C surprised
D dismissive A
Developing Skills for HKDSE -Papers 1 &2 Set B
Book 4 (2021 Revised Edition) Mock Test 1 Paper 1 - for HKDSE

50. Read paragrapt\ 7/dentity the TwO ypes of organizations mentioned that are most aflected by ransomware attacks.
and the reasons. (4 marks)

Organization Reason for paying ransom

a Small /medun sad buiyes lhy rey on data a thes bloodline,


thy dent hane back ups
iv) Vgensy to acess the, yaflat fley
S1. Based on the information in paragraph &)what does 'the flaw' (line 28) refer to? Complete the sentence below using
words from the same paragraph to complete the blanks. (2 marks)

It refers to a security (i) Haw


WannaCry took advantage of to cause damage.
in computers' (i) that

S2. Based on the information given in paragraph 8,)does the writer think cyber erimes are likelyto be an evolving threat?
Sypport you, answer with evidence from the same paragraph. (2 marks)

leasiy ther yny ratnenlla


53 What is the main purpose of paragraph(
A to introduce PC Cyborg
B to show the power of Winlock
C. to reveal some hackers' identities B D
A
D to outline the history of online blackmail

54. Complete the fact sheet below about ransomware using information given in the text. (7 marks)

Ransomware Launch year Known for

PC Cyborg() being G) thc fnt kun ranom ar


Winlock not given
having collected over (iv) VS $ b mllon
of ransom

WannaCry (v) 2017 - its (vi) had a lay overall impact

SamSam not given demanding (vii) hgh ratu to anlet the Re.
returning files to their victims

© Aristo Educational Press Ltd. 2021


DevelopingSkills for HKDSE - Papers 1&2 Set B
Book 4 (2021 Revised Edition) Mock Test 1 Paper 1 -for HKDSE

55.
What does the writer imply when be/she wites 'about half the time, the major risk factor is not the strength of your
sottware systems, but the strength of your decision-making' (lines 41-42)?
A. Choosing experienced hackers is the key to launching successful cyber attacks.
B. Choosing vulnerable tangets is the key to launching
successfulcyber attacks.
C. Choosing which tiles and links to open is the key to
avoiding cyber attacks. A B D
D. Choosing a powerful operating system is the key to
avoiding cyber attacks.
0. DeCIde whether the following statements are True (T), False (F), or if the information is Not
Given (NG) in paragraph
11. Blacken ONE circle only for
each statement. (3 marks)

T NG
Nowadays data recovery professionals charge unreasonably large fees than
hackers for retrieving data.
i1) Some ransomware programs are almost impossible to
combat, leaving data
recovery professionals at a standstill.
iM) Ransomware writers are trying to gain access to victims' computer
systems
through false device requests.

57. According to paragrah 12 does the writer


think that present security measures are efYective in stopping ransomware
attacks? Quote a sentence from paragraph 12 to justify your
answer.
Nonet (2 marks)

58. In paragraph 2what strategies are


recommended for fighting the spread of ransomware? (3 marks)
i)
lninpt cotdeatiad iatomata
ii)

END OF PART B2

© Aristo Educational Press Ltd. 2021


12
First published Iu

You might also like