BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

11th Grade

11 Qs

quiz-placeholder

Similar activities

Computer Crime

Computer Crime

10th - 12th Grade

7 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Detecting and Preventing Cyber Security Threats

Detecting and Preventing Cyber Security Threats

9th - 12th Grade

12 Qs

Hacking LO4

Hacking LO4

10th - 12th Grade

8 Qs

Cyber crime quiz

Cyber crime quiz

11th Grade

11 Qs

IT TA(1 2 3) revision

IT TA(1 2 3) revision

9th - 12th Grade

10 Qs

Empowerment Technologies

Empowerment Technologies

11th Grade

13 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

Assessment

Quiz

Computers

11th Grade

Medium

Created by

J Sharp

Used 52+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"They enjoy the risk involved in attacking systems and want the notoriety that comes with it"

Which of these reasons for systems being attacked match the statement above?

Disruption

Personal Attack

Personal fun and challenge

Financial Gain

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone whose primary motivation to hack is for personal or financial gain"

Which type of hacker is this?

Black Hat

Grey Hat

White Hat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone who looks for vulnerabilities in a system without the owners permission or consent"

Which type of hacker suits this description the best ?

Black Hat

Grey Hat

White Hat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone who hacks for good, they may be hired by a company to find flaws in their systems"

Which type of hacker does this description match the best?

Black Hat

Grey Hat

White Hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware which locks computers on a network and demands money in return for handing control back

Worm

Rootkit

Trojan

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gathers information about the user without their knowledge, this can include private information such as passwords and banking details through keylogging

Spyware

Ransomware

Trojan

Botnet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tricking users into giving their private information, typically done via phone or email by posing as a trustworthy company is known as...

Pharming

Social Engineering

Man-in-the-middle

Shoulder Surfing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?