Threats to data

Threats to data

10th Grade

15 Qs

quiz-placeholder

Similar activities

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

software

software

9th - 12th Grade

20 Qs

Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

J808 4.1 Types of threats

J808 4.1 Types of threats

9th - 11th Grade

20 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

Network Security

Network Security

9th - 11th Grade

10 Qs

Threats to data

Threats to data

Assessment

Quiz

Computers

10th Grade

Medium

IGCSE Computer Science

Standards-aligned

Created by

Lindsey Astbury

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware replicates itself across a network without needing a host program to be opened?

Spyware

Trojan Horse

Virus

Worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the aim of ransomware?

To encrypt data on a system and hold it hostage for ransom

To flood a user's computer with high volumes of adverts

To copy a credit or debit card that has a magnetic stripe

To observe what a user does with a computer and report back to its creator

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to avoid phishing attacks?

Share personal details with unknown sources

Click on unknown links in emails

Check sender's email address and tone of the email

Open attachments from unknown sources

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe software designed to observe what a user does with a computer and report back to its creator?

Spyware

Adware

Ransomware

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can card cloning be achieved by criminals?

By installing malware on a user's computer

By sending phishing emails to obtain card details

By using a skimmer to copy data from a card's magnetic stripe

By using a keylogger to record keystrokes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of phishing attacks?

To encrypt data on a system and hold it hostage for ransom

To copy a credit or debit card that has a magnetic stripe

To observe what a user does with a computer and report back to its creator

To obtain sensitive information such as usernames and passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a trojan horse malware?

To replicate itself across a network

To observe what a user does with a computer and report back to its creator

To disguise as legitimate software and cause harm to the system

To flood a user's computer with high volumes of adverts

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?