8.3 ICT IGCSE Threats to Data

8.3 ICT IGCSE Threats to Data

9th - 12th Grade

21 Qs

quiz-placeholder

Similar activities

LATIHAN INFORMATIKA 9

LATIHAN INFORMATIKA 9

9th Grade

16 Qs

Dampak Sosial Informatika I

Dampak Sosial Informatika I

9th Grade

25 Qs

G10 CS Sem 2 TA The Internet, AI, and Programming

G10 CS Sem 2 TA The Internet, AI, and Programming

10th Grade

21 Qs

Networking

Networking

9th - 11th Grade

21 Qs

Cyber Security basics

Cyber Security basics

12th Grade

16 Qs

Networks and Computer Attacks

Networks and Computer Attacks

9th Grade

17 Qs

BTEC IT Unit 1 - D threats to data & laws

BTEC IT Unit 1 - D threats to data & laws

11th - 12th Grade

20 Qs

IT Essentials Ch 13 Review - Security

IT Essentials Ch 13 Review - Security

9th Grade - University

18 Qs

8.3 ICT IGCSE Threats to Data

8.3 ICT IGCSE Threats to Data

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Ian Stuckey

Used 3+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is hacking?
Repairing a computer system
Gaining unauthorised access to data
Sending junk emails
Encrypting sensitive information

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT a reason for hacking?
Gaining financial benefits
Political motivations
For fun or challenge
To test antivirus software

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is NOT a type of hacking?
Pharming
Key logging
Moshing
Vishing

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the purpose of phishing emails?
Promote software updates
Trick users into sharing personal data

Selling you things

Increase internet speed

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How can you spot a phishing message (choose any that apply)?

Poor language

Use of technical terms

Urgency

Use of official letterhead

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What should you do if you receive a suspicious email asking for personal info?
Respond with fake info
Share it with friends
Contact the company directly
Open the attachment

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Vishing typically occurs through:
Email
Voice calls
Pop-up ads
Fake websites

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?