BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

11th Grade

11 Qs

quiz-placeholder

Similar activities

Esport Studys Guide

Esport Studys Guide

9th - 12th Grade

15 Qs

Routing Statis

Routing Statis

11th Grade

15 Qs

CAM NAT IT - Assessment 2 Revision (A)

CAM NAT IT - Assessment 2 Revision (A)

11th Grade

10 Qs

Found. of IT: Security Threats - B

Found. of IT: Security Threats - B

9th - 12th Grade

10 Qs

Cybersecurity Review

Cybersecurity Review

9th - 12th Grade

14 Qs

Programas Maliciosos s/pdf

Programas Maliciosos s/pdf

11th Grade

15 Qs

R(Ethics , Expert system , Ethical hacking)

R(Ethics , Expert system , Ethical hacking)

8th - 12th Grade

14 Qs

G11 Secure Web Use Part 1

G11 Secure Web Use Part 1

11th Grade

15 Qs

BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

Assessment

Quiz

Computers

11th Grade

Medium

Created by

J Sharp

Used 52+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"They enjoy the risk involved in attacking systems and want the notoriety that comes with it"

Which of these reasons for systems being attacked match the statement above?

Disruption

Personal Attack

Personal fun and challenge

Financial Gain

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone whose primary motivation to hack is for personal or financial gain"

Which type of hacker is this?

Black Hat

Grey Hat

White Hat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone who looks for vulnerabilities in a system without the owners permission or consent"

Which type of hacker suits this description the best ?

Black Hat

Grey Hat

White Hat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone who hacks for good, they may be hired by a company to find flaws in their systems"

Which type of hacker does this description match the best?

Black Hat

Grey Hat

White Hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware which locks computers on a network and demands money in return for handing control back

Worm

Rootkit

Trojan

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gathers information about the user without their knowledge, this can include private information such as passwords and banking details through keylogging

Spyware

Ransomware

Trojan

Botnet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tricking users into giving their private information, typically done via phone or email by posing as a trustworthy company is known as...

Pharming

Social Engineering

Man-in-the-middle

Shoulder Surfing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers