Search Header Logo

Y8 System security

Authored by Mr Bell

Computers

5th Grade

Used 17+ times

Y8 System security
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A program that installs and runs on a computer without the user’s knowledge.

Hardware that controls a user’s computer without their knowledge.

A faulty piece of software.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a virus?

A program that makes the user feel unwell.

A program that replicates itself and spreads to other computers via attachments.

A program that you can download for free.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spyware?

A program that replicates itself and spreads to other computers via attachments.

Hardware that controls a computer without the user's knowledge.

A program that monitors computer activity in an attempt to steal sensitive information.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should be used to remove malware from a computer?

Anti-malware software

A firewall

A filter

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes a passive attack?

Someone attacks a network with malware.

Someone from inside an organisation uses the network to steal information.

Someone monitors data travelling on the network to steal information.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes an active attack?

Someone attacks a network with malware.

Someone from inside an organisation uses the network to steal information.

Someone monitors data travelling on the network to steal information.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these best describes a brute force attack?

A hacker tries to stop people from accessing a network by flooding it with traffic.

Someone tries to get information by cracking password through trial and error.

Someone from inside an organisation tries to steal information.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?