OCR L3 ICT - U1 Ethical & Operational Issues - Threats

OCR L3 ICT - U1 Ethical & Operational Issues - Threats

10th - 12th Grade

23 Qs

quiz-placeholder

Similar activities

OCR GCSE Computer Science: 1.4 Networks (Part 1)

OCR GCSE Computer Science: 1.4 Networks (Part 1)

10th Grade

19 Qs

MTA: 98-367 Security Part 2

MTA: 98-367 Security Part 2

KG - Professional Development

20 Qs

Types of Networks - LANs and WANs

Types of Networks - LANs and WANs

10th - 11th Grade

23 Qs

Forms of Network Attack

Forms of Network Attack

10th Grade

18 Qs

L3: Understanding Security Policies

L3: Understanding Security Policies

9th - 12th Grade

21 Qs

Phishing quiz

Phishing quiz

1st - 12th Grade

20 Qs

security best practices

security best practices

10th Grade - University

20 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

OCR L3 ICT - U1 Ethical & Operational Issues - Threats

OCR L3 ICT - U1 Ethical & Operational Issues - Threats

Assessment

Quiz

Computers

10th - 12th Grade

Medium

Created by

Jon Bridgeman

Used 24+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer virus?
A program written to cause harm to a computer
A hardware fault which causes data to be damaged
A fault with the CPU which means that data is lost or damaged
None of these

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which law makes it illegal to share computer viruses
The Virus Act
The Internet Act
The Computer Misuse Act
The Data Protection Act

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a Trojan Horse do?
Makes the computer stop working
Attaches inside of program
Gets full access
Gets full access

4.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

It is a self-replicating program that uses the network to duplicate its code to the hosts on the network
Virus
Worm
Trojan
Rootkit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Claire, a co-worker, is browsing the internet and wants to know if it's safe to enter her credit card information into a website.what do you tell her to look for?
HTTPS://
HTTP://
SSL://
TLS://

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ray, a co-worker, is concerned that his computer is infected with adware. what symptoms should you tell ray to look for to confirm his suspicions?
Excessive pop-ups.
pizza
search polo
multifactor login redirection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an email in your inbox from your friend Sara. The title of the email is "this is so cool!" and inside the email is an attachment with an .exe extension.what should you do?
delete the email
click the attachment
run virus scan,then click the attachment 
call sara to see if she sent you the mail.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?