ICT test by Michael

ICT test by Michael

11th Grade

10 Qs

quiz-placeholder

Similar activities

About e-Safety

About e-Safety

5th - 12th Grade

14 Qs

IT Security Threats

IT Security Threats

10th - 12th Grade

11 Qs

BTEC DIT C3 LAB - Internal Threats

BTEC DIT C3 LAB - Internal Threats

10th - 11th Grade

10 Qs

L2 - Social Engineering  KS3

L2 - Social Engineering KS3

9th - 11th Grade

10 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

BTEC IT Unit 1 - D1 Threats to data

BTEC IT Unit 1 - D1 Threats to data

10th - 12th Grade

15 Qs

AQA GCSE Computer Science: Malware

AQA GCSE Computer Science: Malware

10th - 11th Grade

13 Qs

Computer Threats

Computer Threats

KG - Professional Development

8 Qs

ICT test by Michael

ICT test by Michael

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Pacilan, P

Used 6+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An email sent from an Internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.( it's related to fish)

Media Image

Phishing

Cathing

Scamming

Answer explanation

It's named after how it is done

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious website that resembles a legitimate website, used to gather or Farm usernames and passwords.

Pharming

Agriculture

Farming

Gathering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of scam that uses internet to mislead the user in many ways attempting to take lead of them.

The purpose of this scam is to cheat the target of their personal property directly rather than private information through fabricated promises, confidence tricks and many more.

Phishing

Internet scam

Bribery

Hacking

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network of zombie computers that have been taken over by a "Robot" or "bot "that performs large- scale malicious acts for the creator of the botnet. Captcha technology is used to avoid this type of security threat.

Internet both

Internet Bots

Hacking

Trojan

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a "MaLicious softWare" disguised as real software often secretly installed, intended to transfer and gather private information, like passwords, without the user's permission.

Malware

Adware

Software

Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A generic term for spyware and adware.

Malware

Incognito

Trojan

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An act performed by a knowledgeable computer user sometimes referred to as hacker that illegally browses or steal someone's information.

Stalking

Spoofing

Hacking

Online threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?