
BTEC DIT C3 LAB - External Threats
Authored by Sarah Rodgers
Computers
10th - 11th Grade
Used 641+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a DOS do?
Floods a server with requests causing it to go offline
Puts a virus file onto your computer
Gets users to share sensitive information through a false pretext.
It is action taken to fix something that has gone wrong.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Man in the Middle Attack is...
Malicious Software (Viruses, Trojans, Spyware)
Intercepting data when it is been sent
Taking down a website by flooding it with data and traffic
Gaining unauthorised access to a computer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
Is a type of malware disguised as legitimate programs.
Is obtaining sensitive information from a user by looking over their shoulder while they use digital machines
A cyber attack that sends spam messages to try and trick people to reply with the desired information.
An attack on a remote computer by making it unable to respond to legitimate user requests.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hacking is...
Malicious Software (Viruses, Trojans, Spyware)
Intercepting data when it is been sent
Taking down a website by flooding it with data and traffic
Gaining unauthorised access to a computer
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
Rootkit
Ransomware
Botnet
Trojan
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call software that allows someone to maintain command and control over a computer without the computer user/owner knowing about it
Bug
Rootkit
Worm
Trojan Horse
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call programs that contain additional functionality designed to secretly monitor your activities on your computer.
Spyware
Adware
Rootkit
Botnet
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Sistema Operativo
Quiz
•
1st - 12th Grade
10 questions
Perifericos y Sistemas Operativos (Basico)
Quiz
•
10th Grade
10 questions
Câu hỏi về thiết bị máy tính
Quiz
•
7th Grade - University
14 questions
TECHNOLOGY
Quiz
•
3rd Grade - Professio...
10 questions
KUIS EXCEL
Quiz
•
10th Grade
12 questions
Tin học 2
Quiz
•
11th Grade
10 questions
Q1 M 2 - TOPIC 2 / Check your understanding
Quiz
•
10th Grade
10 questions
Arduino
Quiz
•
7th - 12th Grade
Popular Resources on Wayground
8 questions
Spartan Way - Classroom Responsible
Quiz
•
9th - 12th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
14 questions
Boundaries & Healthy Relationships
Lesson
•
6th - 8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
3 questions
Integrity and Your Health
Lesson
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
9 questions
FOREST Perception
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade