Data Transmission & Wired connecting Devices

Data Transmission & Wired connecting Devices

Professional Development

14 Qs

quiz-placeholder

Similar activities

ICT Comp Arch & Sec - Hardware

ICT Comp Arch & Sec - Hardware

Professional Development

10 Qs

Input/Output Interface Cards

Input/Output Interface Cards

Professional Development

9 Qs

MME 5.2-USB

MME 5.2-USB

Professional Development

14 Qs

Computer Devices Quiz

Computer Devices Quiz

Professional Development

10 Qs

Computer Quiz

Computer Quiz

1st Grade - Professional Development

15 Qs

B . A. Ist

B . A. Ist

University - Professional Development

10 Qs

ETEC 411 Computer Hardware & Software Quiz

ETEC 411 Computer Hardware & Software Quiz

9th Grade - Professional Development

11 Qs

IT Security Awareness 2023 Vol.2 - Room 1

IT Security Awareness 2023 Vol.2 - Room 1

Professional Development

15 Qs

Data Transmission & Wired connecting Devices

Data Transmission & Wired connecting Devices

Assessment

Quiz

Computers

Professional Development

Hard

Created by

M E

Used 3+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organisation has found a keylogger has been installed on a system that is recording what employees are typing and sending it someone outside the organisation. What type of malware have they been infected with?

Viruses

Worms

Trojans

Spyware

Answer explanation

Spyware is a malicious program that monitors user activity for the purpose of stealing personal information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The organisation’s employees have been receiving a lot of emails that are requesting users enter private details into a web form. What threat is this?

Malware

Hacking

Phishing

Phishing Accidental Damage

Answer explanation

Phishing is where emails are sent purporting to be a reputable company but in fact have been sent by a malicious user for the purpose of gaining personal or financial information.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are likely impacts of the threat identified in the previous question?

Data is deleted from the hard disk and cannot be recovered.

Bank details are accessed and used to steal money

Your network is overloaded with data and can no longer be used.

Login details are gained that can be used for a hack

Answer explanation

Phishing emails are usually used to gain access to private and confidential data, such as bank details, personal details or login details. This can then be used for bank fraud, identity fraud or unauthorised access to systems.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The organisation has noticed someone has been entering in hundreds of password combinations for a username. What type of hacking attack is this?

Rainbow Table

Phishing

Brute Force

Trojan

Answer explanation

This is where a hacker uses a program to generate a large number of consecutive guesses for a password to gain access to a system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If this individual gains access to the system what might the impact of this be?

The business could be blackmailed over releasing details of the hack.

Confidential data could be stolen and released online

Business data could be deleted from the system.

All of them

Answer explanation

Once a user has access to a system they can cause a wide range of harm. Theft, modification or deletion of data is common, as is blackmailing businesses

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of accidental damage?

Overwriting sales records with your own sales.

Spilling liquid onto a device causing it to break.

Deleting unwanted data from the system.

Installing a virus on a computer after being fired.

Answer explanation

Deleting unwanted data or purposely installing a virus is obviously not accidental. However the others can do.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Amanda’s cat dropped a paperweight on her laptop and it no longer can startup. She had many important files and photos stored on the device. What are potential impacts of this for her?

Her system may become infected with malware as a result.

She will need to pay to replace/repair the device.

She may need to pay a specialist to recover the data.

The system will be easier for a malicious user to gain unauthorised access.

Answer explanation

There are many financial costs that can occur as a result of accidental damage. Another impact could be the stress caused to Amanda over the potential loss of important data or photos

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?