Securing Data & Systems WJEC GCSE CBAC

Securing Data & Systems WJEC GCSE CBAC

10th Grade

20 Qs

quiz-placeholder

Similar activities

Digital Citizenship

Digital Citizenship

8th - 12th Grade

20 Qs

Computer Software and Hardware

Computer Software and Hardware

10th Grade

20 Qs

Computer Misuse Act 1990

Computer Misuse Act 1990

10th Grade

15 Qs

Fundamentals of Cyber Security

Fundamentals of Cyber Security

10th Grade

15 Qs

Cambridge Nationals LO4

Cambridge Nationals LO4

10th Grade

20 Qs

j2771.6 Legal Moral Ethical Environmental

j2771.6 Legal Moral Ethical Environmental

9th - 11th Grade

22 Qs

Cyber Safety

Cyber Safety

9th - 12th Grade

17 Qs

HTML Coding Quiz #1 - Period 2

HTML Coding Quiz #1 - Period 2

9th - 12th Grade

20 Qs

Securing Data & Systems WJEC GCSE CBAC

Securing Data & Systems WJEC GCSE CBAC

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Stewart Roberts

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by social engineering?

When cyber criminals take advantage of human behaviours without the

use of code to gain unauthorised access to sensitive data.

When cyber criminals take advantage of poor security to use basic code to gain unauthorised access to sensitive data.

When cyber criminals engineer the code to gain unauthorised access to sensitive data.

When cyber criminals take advantage of poor security to use advanced coding techniques to gain unauthorised access to sensitive data.

2.

REORDER QUESTION

1 min • 1 pt

Reorder the following to show the life cycle of a social engineering attack

Interact with the victim

Identify the victim

remove all traces of the attack

Execute the attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What type of social engineering attack is this?

Phishing

Trojan

Denial of service

Scareware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A fraudulent technique where an internet user is tricked (an email

message is common) into revealing personal or confidential

information

A method of forcing users into denial of service therefore revealing login details

A type of wide scale attack that searches for login details in email inboxes

A fraudulent technique where an internet user is tricked using a coded script into revealing personal or confidential

information.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of language would you expect to see in a phishing email?

Pressuring, urgent demanding

Suggestive, polite, friendly

Formal, non urgent professional

Kind, helpful, endearing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing emails are normally addressed dear sir/madam and are not personal

TRUE

FALSE

7.

MATCH QUESTION

1 min • 1 pt

Match the following Social engineering attack methods

Scareware

Malicious computer

programs designed to trick a

user into buying and

downloading unnecessary

and potentially dangerous

software, such as fake

antivirus protection.

Phishing

This is when a criminal will

make up a scenario in order

to extract sensitive

information. This could be

done via email, over the

phone or even in person.

Baiting

This method refers to the act of obtaining

personal or private

information through direct

observation.

Shoulder Surfing

A fraudulent technique

where an internet user is

tricked (an email message is

common) into revealing

personal or confidential

information.

Blagging

Attacks of this method use a false

promise to pique a victim's

greed or curiosity. They

lure users into a trap that

steals their personal

information or inflicts their

systems with malware.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?