
1.6 Threats to networks 1: People as the weak point
Authored by N Dickinson
Computers
10th Grade
Used 48+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Tricking people into divulging secret information such as passwords and login information
Social Engineering
Poor Network Policy
Poor Password Policy
Denial of Service
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Fake emails or fake online messages from a bank or an online shop asking for details of passwords and credit cards.
Usually contains a malicious link for you to click on.
Phishing
Blagging
Shouldering
Pharming
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This is an example of ...
Phishing
Blagging
Shouldering
Pharming
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Involves a criminal inventing a scenario to persuade a victim to give out information.
For example, pretending to be another employee or network admin
Phishing
Blagging
Shouldering
Pharming
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Involves finding passwords and PINs by watching people as they enter them. Could happen in a busy office or at a distance using binoculars
Phishing
Blagging
Shouldering
Pharming
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
People who use a computer network (employees / students / teachers) must read and sign this document.
Acceptable use policy
Unacceptable use policy
Health and safety document
Electrical use document
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is not likely to be in a network acceptable use policy
Users must not use their own usb devices on the network as they may spread viruses
Users must not download files from the internet as they may be infected
Users must always log off when they are not using a computer
Users must leave their passwords visible on their desk
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?