Threats to Data, Info & Systems

Quiz
•
Computers
•
7th - 12th Grade
•
Medium
Ismael Nobre
Used 12+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organisation has found a keylogger has been installed on a system that is recording what employees are typing and sending it someone outside the organisation. What type of malware have they been infected with?
Viruses
Worms
Trojans
Spyware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The organisation’s employees have been receiving a lot of emails that are requesting users enter private details into a web form. What threat is this?
Malware
Hacking
Phishing
Accidental Damage
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which 2 of the following are likely impacts of the threat identified in the previous question?
Data is deleted from the hard disk and cannot be recovered.
Bank details are accessed and used to steal money.
Your network is overloaded with data and can no longer be used
Login details are gained that can be used for a hack.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The organisation has noticed someone has been entering in hundreds of password combinations for a username. What type of hacking attack is this?
Rainbow Table
Phishing
Brute Force
Trojan
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If this individual gains access to the system what might the impact of this be?
The business could be blackmailed over releasing details of the hack.
Confidential data could be stolen and released online.
Business data could be deleted from the system
All of the above.
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following 2 are examples of accidental damage?
Overwriting sales records with your own sales.
Spilling liquid onto a device causing it to break.
Deleting unwanted data from the system.
Installing a virus on a computer after being fired.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Hannah’s cat dropped a paperweight on her laptop and it no longer can startup. She had many important files and photos stored on the device. What are the 2 potential impacts of this for her?
Her system may become infected with malware as a result.
She will need to pay to replace/repair the device.
She may need to pay a specialist to recover the data.
The system will be easier for a malicious user to gain unauthorised access.
Similar Resources on Wayground
12 questions
Data Protection Act 1988

Quiz
•
6th - 12th Grade
12 questions
Cyber Security Plan

Quiz
•
12th Grade
10 questions
BTEC DIT C3 LAA - Platforms and Services

Quiz
•
10th - 11th Grade
10 questions
Using and Manipulating Data

Quiz
•
12th Grade
9 questions
1.6 Ethics

Quiz
•
10th - 11th Grade
9 questions
Unit 2, 1.1 Holders of information

Quiz
•
12th Grade
10 questions
IGCSE Computer Science - Chapter 9: Problem-Solving and Design

Quiz
•
9th - 10th Grade
10 questions
BTEC DIT C3 LAB - Security Policies & Disaster Recovery

Quiz
•
10th - 11th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
18 questions
Company Logos

Quiz
•
6th - 8th Grade
10 questions
Proper Keyboarding Techniques

Interactive video
•
6th - 10th Grade
14 questions
Inputs and Outputs: Computer Science Intro

Lesson
•
5th - 9th Grade
10 questions
Understanding Computers: Hardware, Software, and Operating Systems

Interactive video
•
7th - 12th Grade
29 questions
AP CSP Unit 2 Review (Code.org)

Quiz
•
10th - 12th Grade