Search Header Logo

L3 U7 Security and Encryption: Section A (1)

Authored by Mike Jenkins

Computers

10th - 12th Grade

Used 5+ times

L3 U7 Security and Encryption: Section A (1)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following would NOT be regarded as a deliberate, internal threat to the company?

Employees accessing content on untrusted websites

Disgruntled employees deleting customer files

Employees selling customer lists online

Employees overriding security controls to install their own software

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following would NOT be regarded as an unintentional, internal threat to the company?

Employees accidentally deleting data without knowing there is no 'recycle bin' or restore function

Employees writing their passwords on a notepad left on a desk

Employees bringing in USB sticks infected with malware from their home machine

Employees overriding security controls to install their own software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following would be regarded as a deliberate, internal threat to the company?

The destruction of a customer database at an offsite data storage centre by flash flooding

Employee login details being obtained by an attacker looking over the employees shoulder

Employees selling customer lists online

Rival organisations paying for black hats to target the company with a DDOS attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Which of the following would be regarded as an unintentional, internal threat to the company?

Disgruntled employees deleting customer files

Cyberterrorists hacking the company accounts due to their involvement in product testing on animals

Employees bringing in USB sticks infected with malware from their home machine

Criminals finding customer information after searching through recycling materials left outside company premises

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

CryptoLocker is an example of what type of malware?

Ransomware

Trojan Horse

Worm

Virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Slammer / SQLSlammer is an example of what type of malware?

Ransomware

Trojan Horse

Worm

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What type of malware collects information without the users consent, usually without their knowledge?

Spyware

Rootkit

Backdoor

Trojan Horse

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?