What is an external threat?
Unit 11 External Threats EB

Quiz
•
Computers
•
12th Grade
•
Medium
Emma Butler
Used 4+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A risk from within a company
A risk from outside a company
A risk from both inside and outside a company
A risk from the internet
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Why are external threats harder to deal with than internal threats?
You can monitor people from the outside like you can employees
You can predict what people from the outside might do next
You cannot monitor people from the outside like you can employees
You can predict what people from the outside might do next, but not employees
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The purpose of ________ software is to cause damage to a computer system.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
What is the difference between viruses and worms?
Viruses can replicate themselves through a network to spread to other computers, while worms modify existing programs with malicious code
Viruses modify existing programs with malicious code, while worms can replicate themselves through a network to spread to other computers
Viruses and worms perform the same function
Viruses and worms are not types of malicious software
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the goal of sabotage?
To gain unauthorised access to a computer system
To disrupt services through the use of denial of service attacks
To deceive people into revealing private and confidential information
To evaluate system vulnerabilities
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is social engineering?
The exploitation of vulnerabilities in a computer system to gain unauthorised access
An activity used to deliberately disrupt services
The techniques used to deceive people into revealing private and confidential information
The use of malicious software to cause damage to a computer system
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
The exploitation of vulnerabilities in a computer system to gain unauthorised access
An activity used to deliberately disrupt services
The techniques used to deceive people into revealing private and confidential information
The use of malicious software to cause damage to a computer system
Similar Resources on Quizizz
10 questions
Cambridge Technicals Unit 3 Cybersecurity

Quiz
•
11th - 12th Grade
10 questions
Found. of IT: Security Threats - A

Quiz
•
9th - 12th Grade
10 questions
Cybersecurity

Quiz
•
12th Grade
10 questions
IT English Essentials: Unit 9 - Quiz 1

Quiz
•
12th Grade
10 questions
Security of Data

Quiz
•
11th - 12th Grade
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
10 questions
Computing Y7 Lesson4 Quiz

Quiz
•
12th Grade - University
11 questions
20. Cybersecurity Malware Quiz

Quiz
•
9th - 12th Grade
Popular Resources on Quizizz
10 questions
Chains by Laurie Halse Anderson Chapters 1-3 Quiz

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
15 questions
Character Analysis

Quiz
•
4th Grade
12 questions
Multiplying Fractions

Quiz
•
6th Grade
30 questions
Biology Regents Review #1

Quiz
•
9th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade
Discover more resources for Computers
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
14 questions
Attributes of Linear Functions

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University
50 questions
Biology Regents Review 2: Ecology

Quiz
•
9th - 12th Grade
20 questions
Investing

Quiz
•
9th - 12th Grade