
L3 U7 Security and Encryption: Section A (1)
Authored by Mike Jenkins
Computers
10th - 12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would NOT be regarded as a deliberate, internal threat to the company?
Employees accessing content on untrusted websites
Disgruntled employees deleting customer files
Employees selling customer lists online
Employees overriding security controls to install their own software
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would NOT be regarded as an unintentional, internal threat to the company?
Employees accidentally deleting data without knowing there is no 'recycle bin' or restore function
Employees writing their passwords on a notepad left on a desk
Employees bringing in USB sticks infected with malware from their home machine
Employees overriding security controls to install their own software
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would be regarded as a deliberate, internal threat to the company?
The destruction of a customer database at an offsite data storage centre by flash flooding
Employee login details being obtained by an attacker looking over the employees shoulder
Employees selling customer lists online
Rival organisations paying for black hats to target the company with a DDOS attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following would be regarded as an unintentional, internal threat to the company?
Disgruntled employees deleting customer files
Cyberterrorists hacking the company accounts due to their involvement in product testing on animals
Employees bringing in USB sticks infected with malware from their home machine
Criminals finding customer information after searching through recycling materials left outside company premises
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
CryptoLocker is an example of what type of malware?
Ransomware
Trojan Horse
Worm
Virus
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Slammer / SQLSlammer is an example of what type of malware?
Ransomware
Trojan Horse
Worm
Virus
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware collects information without the users consent, usually without their knowledge?
Spyware
Rootkit
Backdoor
Trojan Horse
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?