Threats to Data, Info & Systems

Threats to Data, Info & Systems

7th - 12th Grade

7 Qs

quiz-placeholder

Similar activities

Cybersecurity Resilience

Cybersecurity Resilience

10th Grade

10 Qs

Year 9 computer crime mid term assessment

Year 9 computer crime mid term assessment

9th Grade

10 Qs

BTEC DIT C3 LAB - Data Level Protection 1

BTEC DIT C3 LAB - Data Level Protection 1

10th - 11th Grade

10 Qs

BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

10th - 11th Grade

10 Qs

Cambridge Technical Unit 3 LO1

Cambridge Technical Unit 3 LO1

11th Grade

10 Qs

Operating System

Operating System

5th - 9th Grade

10 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Digital Tech WJEC Topic 5b Cyber Resilience

Digital Tech WJEC Topic 5b Cyber Resilience

10th Grade

10 Qs

Threats to Data, Info & Systems

Threats to Data, Info & Systems

Assessment

Quiz

Computers

7th - 12th Grade

Medium

Created by

Ismael Nobre

Used 12+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organisation has found a keylogger has been installed on a system that is recording what employees are typing and sending it someone outside the organisation. What type of malware have they been infected with?

Viruses

Worms

Trojans

Spyware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The organisation’s employees have been receiving a lot of emails that are requesting users enter private details into a web form. What threat is this?

Malware

Hacking

Phishing

Accidental Damage

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which 2 of the following are likely impacts of the threat identified in the previous question?

Data is deleted from the hard disk and cannot be recovered.

Bank details are accessed and used to steal money.

Your network is overloaded with data and can no longer be used

Login details are gained that can be used for a hack.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The organisation has noticed someone has been entering in hundreds of password combinations for a username. What type of hacking attack is this?

Rainbow Table

Phishing

Brute Force

Trojan

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If this individual gains access to the system what might the impact of this be?

The business could be blackmailed over releasing details of the hack.

Confidential data could be stolen and released online.

Business data could be deleted from the system

All of the above.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following 2 are examples of accidental damage?

Overwriting sales records with your own sales.

Spilling liquid onto a device causing it to break.

Deleting unwanted data from the system.

Installing a virus on a computer after being fired.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Hannah’s cat dropped a paperweight on her laptop and it no longer can startup. She had many important files and photos stored on the device. What are the 2 potential impacts of this for her?

Her system may become infected with malware as a result.

She will need to pay to replace/repair the device.

She may need to pay a specialist to recover the data.

The system will be easier for a malicious user to gain unauthorised access.