1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

quiz-placeholder

Similar activities

9G4 CS Python Programming Sequence and Vocabs

9G4 CS Python Programming Sequence and Vocabs

9th Grade

13 Qs

TIN 11 - PYTHON - PHÉP TOÁN - BIỂU THỨC - CÂU LỆNH GÁN

TIN 11 - PYTHON - PHÉP TOÁN - BIỂU THỨC - CÂU LỆNH GÁN

11th Grade

10 Qs

hardware and software(g3)

hardware and software(g3)

2nd - 10th Grade

10 Qs

EMPTECH L4 Q3

EMPTECH L4 Q3

12th Grade

10 Qs

Microbit Features Activity

Microbit Features Activity

6th - 8th Grade

9 Qs

Microcontroller

Microcontroller

11th Grade - University

10 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

MODULE 9 PRE-TEST

MODULE 9 PRE-TEST

10th Grade

10 Qs

1.4 - Network Attacks

1.4 - Network Attacks

Assessment

Quiz

Computers

7th - 12th Grade

Practice Problem

Medium

Used 186+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term 'blagging'?

It is when fraudsters send emails pretending to be a bank or e-commerce site to try and find out your personal and financial details.  Messages are often urgent and have spelling mistakes.
Sometimes called pretexting, done either face-to-face, by telephone or using a computer.  Criminals invent a scenario to get the victim to divulge information.
  Finding out login names, passwords and pins by watching people at ATM’s, or in an office where employees enter passwords or when people pay for goods at tills and people watch the PINs being entered.
Software that is deigned to corrupt files and stop your computer from working.

2.

MULTIPLE CHOICE QUESTION

30 sec • 8 pts

What is meant by the term 'shouldering'?

Finding out login names, passwords and pins by watching people at ATM’s, or in an office where employees enter passwords or when people pay for goods at tills and people watch the PINs being entered.
Sometimes called pretexting, done either face-to-face, by telephone or using a computer.  Criminals invent a scenario to get the victim to divulge information.
It is when fraudsters send emails pretending to be a bank or e-commerce site to try and find out your personal and financial details.  Messages are often urgent and have spelling mistakes.

3.

MULTIPLE CHOICE QUESTION

45 sec • 8 pts

What is meant by the term 'phishing'?

Finding out login names, passwords and pins by watching people at ATM’s, or in an office where employees enter passwords or when people pay for goods at tills and people watch the PINs being entered.
Sometimes called pretexting, done either face-to-face, by telephone or using a computer.  Criminals invent a scenario to get the victim to divulge information.
It is when fraudsters send emails pretending to be a bank or e-commerce site to try and find out your personal and financial details.  Messages are often urgent and have spelling mistakes.

4.

MULTIPLE CHOICE QUESTION

45 sec • 8 pts

This software is designed to disrupt the functioning of the computer, gain unauthorised access and gather information without the users knowledge - what is it?

Applications sofware
Systems software
Malicious software
Utility software

5.

MULTIPLE CHOICE QUESTION

30 sec • 8 pts

How does a virus infect a computer and how is it malicious?

It is disguised as something legitimate like a computer game. Once inside it can log key strokes, record passwords and can allow someone to remote access your computer.
Software that usually infects a computer system via email attachments or being attached to files on memory sticks. It requires human help to infect a computer. It can corrupt/delete files and slow your pc down.

6.

MULTIPLE CHOICE QUESTION

45 sec • 8 pts

How does a trojan horse infect a pc and how is it malicious?

Software that is disguised as something legitimate like a computer game. Once inside it can log key strokes, record passwords and can allow someone to remote access your computer.
Software that is similar to a virus, although it can infect your computer without human help, instead through security loopholes. Once inside your computer it can replicate itself across networks. It is malicious as it can slow your pc down, delete files and send documents via email.

7.

MULTIPLE CHOICE QUESTION

30 sec • 8 pts

What is meant by the term spyware?

A type of spyware that causes adverts to pop-up on your screen. Some can be inappropriate. They waste your time and distract you from what you are doing.
Malware that you may have received in an email. This can change the IP address of a domain name entered to a bogus one.
Software similar to a 'Trojan' as it spies on what you are doing and passes this information back across the internet.
Fraudsters sending emails pretending to be banks etc... recognised by : careless use of language, urgency, false links and attachments.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?