Search Header Logo

8.3 ICT IGCSE Threats to Data

Authored by Ian Stuckey

Computers

9th - 12th Grade

Used 4+ times

8.3 ICT IGCSE Threats to Data
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is hacking?

Repairing a computer system
Gaining unauthorised access to data
Sending junk emails
Encrypting sensitive information

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT a reason for hacking?

Gaining financial benefits
Political motivations
For fun or challenge
To test antivirus software

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT a type of hacking?

Pharming
Key logging
Moshing
Vishing

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of phishing emails?

Promote software updates
Trick users into sharing personal data

Selling you things

Increase internet speed

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How can you spot a phishing message (choose any that apply)?

Poor language

Use of technical terms

Urgency

Use of official letterhead

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What should you do if you receive a suspicious email asking for personal info?

Respond with fake info
Share it with friends
Contact the company directly
Open the attachment

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Vishing typically occurs through:

Email
Voice calls
Pop-up ads
Fake websites

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?