Malware is...
BTEC DIT C3 LAB - Why Systems Are Attacked

Quiz
•
Computers
•
10th - 11th Grade
•
Medium

Sarah Rodgers
Used 168+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malicious Software (Viruses, Trojans, Spyware)
Intercepting data when it is been sent
Taking down a website by flooding it with data and traffic
Gaining unauthorised access to a computer
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does ransomware software do?
Steals information from your computer
Locks and encrypts your computer and asks for money
Robs you
Obtains sensitive information by shoulder surfing.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An idea that you invented that belongs to you, for example an image you created is known as?
Distributed Data
Intellectual property
Industrial Espionage
Consumables
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Industrial espionage is...?
When a remote computer is attacked and made unable to respond to legitimate user requests.
A cyberattack that sends spam messages to try and trick people to reply with desired information.
A measure of effectiveness – how long it takes an employee to produce an item for sale.
Stealing private information from a company to benefit the organisations competitors
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Identify which of the following are motivations behind why systems are attacked. (Choose all that apply)
To increase the value of shares
To cause disruption
Challenge/Fun
To gain financially
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A personal attack is when
a remote computer attacks a system making it unable to respond to legitimate user requests
additional settings or program codes are used to fix vulnerabilities in a system.
someone,such as an ex employee attacks an organisation because they hold a grudge against the employer or organisation
sensitive personal information is obtained from a user by looking over their shoulder while they use a digital device.
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which type of system attack is most likely to lead to identity theft?
Industrial espionage
DOS attack
A ransomware attack
Data and information theft
Create a free account and access millions of resources
Similar Resources on Quizizz
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
13 questions
J277 1.4 Network Security Quiz (Forms of Attack)

Quiz
•
9th - 12th Grade
14 questions
1.4 - Network Attacks

Quiz
•
7th - 12th Grade
15 questions
Cybersecurity Quiz 3

Quiz
•
10th Grade
10 questions
Data Security

Quiz
•
5th - 10th Grade
9 questions
Malware

Quiz
•
7th - 11th Grade
15 questions
Malware

Quiz
•
7th - 11th Grade
10 questions
BTEC DIT C3 LAB - External Threats

Quiz
•
10th - 11th Grade
Popular Resources on Quizizz
10 questions
Chains by Laurie Halse Anderson Chapters 1-3 Quiz

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
15 questions
Character Analysis

Quiz
•
4th Grade
12 questions
Multiplying Fractions

Quiz
•
6th Grade
30 questions
Biology Regents Review #1

Quiz
•
9th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade
Discover more resources for Computers
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
14 questions
Attributes of Linear Functions

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University
50 questions
Biology Regents Review 2: Ecology

Quiz
•
9th - 12th Grade
20 questions
Investing

Quiz
•
9th - 12th Grade