Search Header Logo

1.4 - Network Attacks

Computers

7th - 12th Grade

Used 187+ times

1.4 - Network Attacks
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term 'blagging'?

It is when fraudsters send emails pretending to be a bank or e-commerce site to try and find out your personal and financial details.  Messages are often urgent and have spelling mistakes.
Sometimes called pretexting, done either face-to-face, by telephone or using a computer.  Criminals invent a scenario to get the victim to divulge information.
  Finding out login names, passwords and pins by watching people at ATM’s, or in an office where employees enter passwords or when people pay for goods at tills and people watch the PINs being entered.
Software that is deigned to corrupt files and stop your computer from working.

2.

MULTIPLE CHOICE QUESTION

30 sec • 8 pts

What is meant by the term 'shouldering'?

Finding out login names, passwords and pins by watching people at ATM’s, or in an office where employees enter passwords or when people pay for goods at tills and people watch the PINs being entered.
Sometimes called pretexting, done either face-to-face, by telephone or using a computer.  Criminals invent a scenario to get the victim to divulge information.
It is when fraudsters send emails pretending to be a bank or e-commerce site to try and find out your personal and financial details.  Messages are often urgent and have spelling mistakes.

3.

MULTIPLE CHOICE QUESTION

45 sec • 8 pts

What is meant by the term 'phishing'?

Finding out login names, passwords and pins by watching people at ATM’s, or in an office where employees enter passwords or when people pay for goods at tills and people watch the PINs being entered.
Sometimes called pretexting, done either face-to-face, by telephone or using a computer.  Criminals invent a scenario to get the victim to divulge information.
It is when fraudsters send emails pretending to be a bank or e-commerce site to try and find out your personal and financial details.  Messages are often urgent and have spelling mistakes.

4.

MULTIPLE CHOICE QUESTION

45 sec • 8 pts

This software is designed to disrupt the functioning of the computer, gain unauthorised access and gather information without the users knowledge - what is it?

Applications sofware
Systems software
Malicious software
Utility software

5.

MULTIPLE CHOICE QUESTION

30 sec • 8 pts

How does a virus infect a computer and how is it malicious?

It is disguised as something legitimate like a computer game. Once inside it can log key strokes, record passwords and can allow someone to remote access your computer.
Software that usually infects a computer system via email attachments or being attached to files on memory sticks. It requires human help to infect a computer. It can corrupt/delete files and slow your pc down.

6.

MULTIPLE CHOICE QUESTION

45 sec • 8 pts

How does a trojan horse infect a pc and how is it malicious?

Software that is disguised as something legitimate like a computer game. Once inside it can log key strokes, record passwords and can allow someone to remote access your computer.
Software that is similar to a virus, although it can infect your computer without human help, instead through security loopholes. Once inside your computer it can replicate itself across networks. It is malicious as it can slow your pc down, delete files and send documents via email.

7.

MULTIPLE CHOICE QUESTION

30 sec • 8 pts

What is meant by the term spyware?

A type of spyware that causes adverts to pop-up on your screen. Some can be inappropriate. They waste your time and distract you from what you are doing.
Malware that you may have received in an email. This can change the IP address of a domain name entered to a bogus one.
Software similar to a 'Trojan' as it spies on what you are doing and passes this information back across the internet.
Fraudsters sending emails pretending to be banks etc... recognised by : careless use of language, urgency, false links and attachments.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?