Year 12-Threats to Data, Information and Systems

Year 12-Threats to Data, Information and Systems

11th Grade

7 Qs

quiz-placeholder

Similar activities

Malware Knowledge Quiz

Malware Knowledge Quiz

9th - 12th Grade

12 Qs

Cybersecurity 1

Cybersecurity 1

5th Grade - University

12 Qs

J808 LO4.1.1 Botnets

J808 LO4.1.1 Botnets

11th Grade

10 Qs

IGCSE ICT - Safety and Security

IGCSE ICT - Safety and Security

10th - 12th Grade

7 Qs

Prestes Keamanan Jaringan

Prestes Keamanan Jaringan

11th Grade

10 Qs

TECHNO-QUIZ.AVERAGE CATEGORY

TECHNO-QUIZ.AVERAGE CATEGORY

10th Grade - University

10 Qs

A-level Utility Software video quiz

A-level Utility Software video quiz

11th Grade

10 Qs

Class IX Cyber Security and Network

Class IX Cyber Security and Network

9th - 12th Grade

9 Qs

Year 12-Threats to Data, Information and Systems

Year 12-Threats to Data, Information and Systems

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Mihiri Ekanayake

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a computer virus?

To disrupt systems and cause major operational issues

To monitor user actions

To encrypt files for ransom

To create a backdoor for remote access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between a virus and a worm?

A virus requires user action to spread, while a worm spreads automatically

A virus encrypts files, while a worm does not

A virus monitors user actions, while a worm does not

A virus is a type of spyware, while a worm is not

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main characteristic of a Trojan?

It encrypts files for ransom

It spreads without attaching to files

It disguises as legitimate software

It monitors user actions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ransomware do?

It monitors user actions

It encrypts files and demands a fee to unlock them

It spreads without attaching to files

It disguises as legitimate software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of a phishing attack?

To encrypt data

To gain physical access to a computer

To trick individuals into revealing sensitive information

To perform a denial of service attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes hacking?

Using software to back up data regularly

Gaining unauthorized access to computer systems or networks

Encrypting files to prevent data loss

Installing antivirus software on a device

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a potential consequence of a data breach for an organization?

Increased customer trust

Reduced need for cybersecurity measures

Financial loss and reputational damage

Faster system performance