
Data Transmission & Wired connecting Devices

Quiz
•
Computers
•
Professional Development
•
Hard
M E
Used 3+ times
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organisation has found a keylogger has been installed on a system that is recording what employees are typing and sending it someone outside the organisation. What type of malware have they been infected with?
Viruses
Worms
Trojans
Spyware
Answer explanation
Spyware is a malicious program that monitors user activity for the purpose of stealing personal information.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The organisation’s employees have been receiving a lot of emails that are requesting users enter private details into a web form. What threat is this?
Malware
Hacking
Phishing
Phishing Accidental Damage
Answer explanation
Phishing is where emails are sent purporting to be a reputable company but in fact have been sent by a malicious user for the purpose of gaining personal or financial information.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are likely impacts of the threat identified in the previous question?
Data is deleted from the hard disk and cannot be recovered.
Bank details are accessed and used to steal money
Your network is overloaded with data and can no longer be used.
Login details are gained that can be used for a hack
Answer explanation
Phishing emails are usually used to gain access to private and confidential data, such as bank details, personal details or login details. This can then be used for bank fraud, identity fraud or unauthorised access to systems.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The organisation has noticed someone has been entering in hundreds of password combinations for a username. What type of hacking attack is this?
Rainbow Table
Phishing
Brute Force
Trojan
Answer explanation
This is where a hacker uses a program to generate a large number of consecutive guesses for a password to gain access to a system
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If this individual gains access to the system what might the impact of this be?
The business could be blackmailed over releasing details of the hack.
Confidential data could be stolen and released online
Business data could be deleted from the system.
All of them
Answer explanation
Once a user has access to a system they can cause a wide range of harm. Theft, modification or deletion of data is common, as is blackmailing businesses
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are examples of accidental damage?
Overwriting sales records with your own sales.
Spilling liquid onto a device causing it to break.
Deleting unwanted data from the system.
Installing a virus on a computer after being fired.
Answer explanation
Deleting unwanted data or purposely installing a virus is obviously not accidental. However the others can do.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Amanda’s cat dropped a paperweight on her laptop and it no longer can startup. She had many important files and photos stored on the device. What are potential impacts of this for her?
Her system may become infected with malware as a result.
She will need to pay to replace/repair the device.
She may need to pay a specialist to recover the data.
The system will be easier for a malicious user to gain unauthorised access.
Answer explanation
There are many financial costs that can occur as a result of accidental damage. Another impact could be the stress caused to Amanda over the potential loss of important data or photos
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
ITF - Quiz 8.3 - Optical Discs and Drives

Quiz
•
Professional Development
16 questions
Peripherals

Quiz
•
Professional Development
15 questions
ITF - Quiz 8.2 - Mass Storage Devices

Quiz
•
Professional Development
12 questions
ITF - Quiz 7.5 - Graphics Devices

Quiz
•
Professional Development
14 questions
IC3_Test1

Quiz
•
Professional Development
17 questions
Cheese

Quiz
•
KG - Professional Dev...
10 questions
Microprocessor 8086 Architecture -Module I

Quiz
•
Professional Development
9 questions
Understanding PATA

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade