
BTEC DIT C3 LAB - Why Systems Are Attacked
Authored by Sarah Rodgers
Computers
10th - 11th Grade
Used 178+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware is...
Malicious Software (Viruses, Trojans, Spyware)
Intercepting data when it is been sent
Taking down a website by flooding it with data and traffic
Gaining unauthorised access to a computer
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does ransomware software do?
Steals information from your computer
Locks and encrypts your computer and asks for money
Robs you
Obtains sensitive information by shoulder surfing.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An idea that you invented that belongs to you, for example an image you created is known as?
Distributed Data
Intellectual property
Industrial Espionage
Consumables
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Industrial espionage is...?
When a remote computer is attacked and made unable to respond to legitimate user requests.
A cyberattack that sends spam messages to try and trick people to reply with desired information.
A measure of effectiveness – how long it takes an employee to produce an item for sale.
Stealing private information from a company to benefit the organisations competitors
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Identify which of the following are motivations behind why systems are attacked. (Choose all that apply)
To increase the value of shares
To cause disruption
Challenge/Fun
To gain financially
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A personal attack is when
a remote computer attacks a system making it unable to respond to legitimate user requests
additional settings or program codes are used to fix vulnerabilities in a system.
someone,such as an ex employee attacks an organisation because they hold a grudge against the employer or organisation
sensitive personal information is obtained from a user by looking over their shoulder while they use a digital device.
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which type of system attack is most likely to lead to identity theft?
Industrial espionage
DOS attack
A ransomware attack
Data and information theft
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
13 questions
Kuis Animasi 3D - 3
Quiz
•
11th Grade
15 questions
History of Computers
Quiz
•
6th - 12th Grade
10 questions
Sprawdź się
Quiz
•
4th - 12th Grade
12 questions
Tin học 2
Quiz
•
11th Grade
10 questions
Q1 M 2 - TOPIC 2 / Check your understanding
Quiz
•
10th Grade
10 questions
Sistema Operativo
Quiz
•
1st - 12th Grade
10 questions
Perifericos y Sistemas Operativos (Basico)
Quiz
•
10th Grade
14 questions
TECHNOLOGY
Quiz
•
3rd Grade - Professio...
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade