BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

11th Grade

11 Qs

quiz-placeholder

Similar activities

Word 2016 Lesson 1

Word 2016 Lesson 1

9th - 12th Grade

10 Qs

Security Risks & Precautions

Security Risks & Precautions

10th - 12th Grade

8 Qs

IGCSE Chapter 8 - Safety & Security

IGCSE Chapter 8 - Safety & Security

11th Grade

12 Qs

BTEC DIT - C3 - B3 - Policy

BTEC DIT - C3 - B3 - Policy

11th Grade

9 Qs

ERDs and DFDs

ERDs and DFDs

9th - 12th Grade

15 Qs

ข้อสอบ เทคโนโลยีสารสนเทศ

ข้อสอบ เทคโนโลยีสารสนเทศ

10th - 12th Grade

10 Qs

komputer dan jaringan

komputer dan jaringan

9th - 12th Grade

10 Qs

Kalasag Hacker's Night Game Time

Kalasag Hacker's Night Game Time

KG - Professional Development

15 Qs

BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

J Sharp

Used 52+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"They enjoy the risk involved in attacking systems and want the notoriety that comes with it"

Which of these reasons for systems being attacked match the statement above?

Disruption

Personal Attack

Personal fun and challenge

Financial Gain

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone whose primary motivation to hack is for personal or financial gain"

Which type of hacker is this?

Black Hat

Grey Hat

White Hat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone who looks for vulnerabilities in a system without the owners permission or consent"

Which type of hacker suits this description the best ?

Black Hat

Grey Hat

White Hat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone who hacks for good, they may be hired by a company to find flaws in their systems"

Which type of hacker does this description match the best?

Black Hat

Grey Hat

White Hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware which locks computers on a network and demands money in return for handing control back

Worm

Rootkit

Trojan

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gathers information about the user without their knowledge, this can include private information such as passwords and banking details through keylogging

Spyware

Ransomware

Trojan

Botnet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tricking users into giving their private information, typically done via phone or email by posing as a trustworthy company is known as...

Pharming

Social Engineering

Man-in-the-middle

Shoulder Surfing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?