Search Header Logo
2.1.5 Threats to data

2.1.5 Threats to data

Assessment

Presentation

Computers

KG

Practice Problem

Medium

Created by

Mrs Vaughan

Used 6+ times

FREE Resource

0 Slides • 10 Questions

1

Multiple Select

This is an example of accidental damage. Tick 2.

1

Deliberatly deleting files

2

Leaving a laptop on the train

3

A natural disaster

4

installing a virus

2

Fill in the Blank

A computer program designed to copy itself repeatedly and attaches itself to other computer programs is called a

3

Multiple Choice

Repeatedly trying combinations of characters in usernames and passwords in order to gain access to a computer system

1

Social engineering

2

DOS

3

Brute force attack

4

Phishing

4

Multiple Choice

Repeatedly sending traffic to a network to authenticate a request

1

Social engineering

2

DOS

3

Brute force attack

4

Phishing

5

Multiple Choice

Manipulation of people into revealing personal data

1

Social engineering

2

DOS

3

Brute force attack

4

Phishing

6

Fill in the Blank

Systems can be protected by:

1. Encryption

2.

3. Antivirus software

4. Hierarchical access levels

7

Multiple Choice

Question image

What type of encryption is Caesar Cipher?

1

Symmetrical

2

Asymmetric

3
4

8

Poll

An advantage of asymmetric encryption is that it is more secure as each user has their own key.

True

False

9

Poll

An advantage of symmetric encryption is that it is simple and quick to decrypt.

True

False

10

Multiple Choice

With symmetric encryption, the encryption and decryption key are the same

1

True

2

False

This is an example of accidental damage. Tick 2.

1

Deliberatly deleting files

2

Leaving a laptop on the train

3

A natural disaster

4

installing a virus

Show answer

Auto Play

Slide 1 / 10

MULTIPLE SELECT