BTEC Tech Award DIT - Threats, Prevention, Policy (Complete)

BTEC Tech Award DIT - Threats, Prevention, Policy (Complete)

9th - 10th Grade

26 Qs

quiz-placeholder

Similar activities

The Future of Your Job in the Age of AI (Video 6)

The Future of Your Job in the Age of AI (Video 6)

10th Grade

21 Qs

PAS JACOB SEM 1

PAS JACOB SEM 1

10th Grade

21 Qs

sistem komputer

sistem komputer

9th - 12th Grade

21 Qs

Documental: Historia secreta de los piratas informáticos

Documental: Historia secreta de los piratas informáticos

10th - 12th Grade

22 Qs

Computer System

Computer System

9th - 11th Grade

21 Qs

Search Engines

Search Engines

8th - 10th Grade

24 Qs

Social Media and the Internet Safety

Social Media and the Internet Safety

1st - 11th Grade

21 Qs

Penegnalan Komputer X KM 11

Penegnalan Komputer X KM 11

10th Grade

21 Qs

BTEC Tech Award DIT - Threats, Prevention, Policy (Complete)

BTEC Tech Award DIT - Threats, Prevention, Policy (Complete)

Assessment

Quiz

Computers

9th - 10th Grade

Practice Problem

Medium

Created by

E Gibson

Used 181+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Man in the Middle Attack is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Denial of Service Attack is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Internal Threats to a company can be...

Employees visiting untrustworthy websites

Employees bringing in portable devices containing malware

Someone hacking a computer from across the internet

Someone flooding the company website with traffic and data to take it down

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are physical security measures?

CCTV

Anti-virus software

Locks

Passwords

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Passwords...

Must be simple

Must be the same between accounts

Vary between accounts

Must be complex

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?