1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

quiz-placeholder

Similar activities

Jaringan komputer n sejarah internat

Jaringan komputer n sejarah internat

8th Grade

15 Qs

Coding Quiz

Coding Quiz

6th - 10th Grade

15 Qs

Polski Youtube 2019/2020

Polski Youtube 2019/2020

1st - 8th Grade

15 Qs

INTRODUCING PYHTON

INTRODUCING PYHTON

7th Grade

16 Qs

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

CIA Mid-Term Review 1

CIA Mid-Term Review 1

9th - 10th Grade

17 Qs

flowol week 3

flowol week 3

9th - 12th Grade

17 Qs

Pre-Assessment: ICT 10 Orientation Day

Pre-Assessment: ICT 10 Orientation Day

10th Grade

10 Qs

1.4 - Network Attacks

1.4 - Network Attacks

Assessment

Quiz

Computers

7th - 12th Grade

Medium

Used 186+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by the term 'blagging'?
It is when fraudsters send emails pretending to be a bank or e-commerce site to try and find out your personal and financial details.  Messages are often urgent and have spelling mistakes.
Sometimes called pretexting, done either face-to-face, by telephone or using a computer.  Criminals invent a scenario to get the victim to divulge information.
  Finding out login names, passwords and pins by watching people at ATM’s, or in an office where employees enter passwords or when people pay for goods at tills and people watch the PINs being entered.
Software that is deigned to corrupt files and stop your computer from working.

2.

MULTIPLE CHOICE QUESTION

30 sec • 8 pts

What is meant by the term 'shouldering'?
Finding out login names, passwords and pins by watching people at ATM’s, or in an office where employees enter passwords or when people pay for goods at tills and people watch the PINs being entered.
Sometimes called pretexting, done either face-to-face, by telephone or using a computer.  Criminals invent a scenario to get the victim to divulge information.
It is when fraudsters send emails pretending to be a bank or e-commerce site to try and find out your personal and financial details.  Messages are often urgent and have spelling mistakes.

3.

MULTIPLE CHOICE QUESTION

45 sec • 8 pts

What is meant by the term 'phishing'?
Finding out login names, passwords and pins by watching people at ATM’s, or in an office where employees enter passwords or when people pay for goods at tills and people watch the PINs being entered.
Sometimes called pretexting, done either face-to-face, by telephone or using a computer.  Criminals invent a scenario to get the victim to divulge information.
It is when fraudsters send emails pretending to be a bank or e-commerce site to try and find out your personal and financial details.  Messages are often urgent and have spelling mistakes.

4.

MULTIPLE CHOICE QUESTION

45 sec • 8 pts

This software is designed to disrupt the functioning of the computer, gain unauthorised access and gather information without the users knowledge - what is it?
Applications sofware
Systems software
Malicious software
Utility software

5.

MULTIPLE CHOICE QUESTION

30 sec • 8 pts

How does a virus infect a computer and how is it malicious?
It is disguised as something legitimate like a computer game. Once inside it can log key strokes, record passwords and can allow someone to remote access your computer.
Software that usually infects a computer system via email attachments or being attached to files on memory sticks. It requires human help to infect a computer. It can corrupt/delete files and slow your pc down.

6.

MULTIPLE CHOICE QUESTION

45 sec • 8 pts

How does a trojan horse infect a pc and how is it malicious?
Software that is disguised as something legitimate like a computer game. Once inside it can log key strokes, record passwords and can allow someone to remote access your computer.
Software that is similar to a virus, although it can infect your computer without human help, instead through security loopholes. Once inside your computer it can replicate itself across networks. It is malicious as it can slow your pc down, delete files and send documents via email.

7.

MULTIPLE CHOICE QUESTION

30 sec • 8 pts

What is meant by the term spyware?
A type of spyware that causes adverts to pop-up on your screen. Some can be inappropriate. They waste your time and distract you from what you are doing.
Malware that you may have received in an email. This can change the IP address of a domain name entered to a bogus one.
Software similar to a 'Trojan' as it spies on what you are doing and passes this information back across the internet.
Fraudsters sending emails pretending to be banks etc... recognised by : careless use of language, urgency, false links and attachments.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?