
8.3 ICT IGCSE Threats to Data
Authored by Ian Stuckey
Computers
9th - 12th Grade
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is hacking?
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is NOT a reason for hacking?
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following is NOT a type of hacking?
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the purpose of phishing emails?
Selling you things
5.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
How can you spot a phishing message (choose any that apply)?
Poor language
Urgency
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What should you do if you receive a suspicious email asking for personal info?
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Vishing typically occurs through:
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?