BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Chapter 3

Cybersecurity Chapter 3

11th Grade

9 Qs

IT Security Threats

IT Security Threats

10th - 12th Grade

11 Qs

1.5.1 - Starter Task/Social Engineering Starter (Dg)

1.5.1 - Starter Task/Social Engineering Starter (Dg)

11th Grade

9 Qs

Data Protection

Data Protection

KG - 12th Grade

10 Qs

quiz_base_fill_in _blank

quiz_base_fill_in _blank

9th - 10th Grade

10 Qs

MALWAE AND ANTIVIRUS

MALWAE AND ANTIVIRUS

9th - 10th Grade

15 Qs

Cyber Security Threats

Cyber Security Threats

10th Grade

15 Qs

ITGS: 1.02 Security and 1.05 Authenticity

ITGS: 1.02 Security and 1.05 Authenticity

9th - 12th Grade

12 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

Assessment

Quiz

Computers

10th - 11th Grade

Hard

Created by

Sarah Rodgers

Used 616+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a DOS do?

Floods a server with requests causing it to go offline

Puts a virus file onto your computer

Gets users to share sensitive information through a false pretext.

It is action taken to fix something that has gone wrong.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Man in the Middle Attack is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Is a type of malware disguised as legitimate programs.

Is obtaining sensitive information from a user by looking over their shoulder while they use digital machines

A cyber attack that sends spam messages to try and trick people to reply with the desired information.

An attack on a remote computer by making it unable to respond to legitimate user requests.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.

Rootkit

Ransomware

Botnet

Trojan

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call software that allows someone to maintain command and control over a computer without the computer user/owner knowing about it

Bug

Rootkit

Worm

Trojan Horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call programs that contain additional functionality designed to secretly monitor your activities on your computer.

Spyware

Adware

Rootkit

Botnet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?