BTEC DIT C3 LAB - Why Systems Are Attacked
Quiz
•
Computers
•
10th - 11th Grade
•
Practice Problem
•
Medium

Sarah Rodgers
Used 175+ times
FREE Resource
Enhance your content in a minute
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware is...
Malicious Software (Viruses, Trojans, Spyware)
Intercepting data when it is been sent
Taking down a website by flooding it with data and traffic
Gaining unauthorised access to a computer
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does ransomware software do?
Steals information from your computer
Locks and encrypts your computer and asks for money
Robs you
Obtains sensitive information by shoulder surfing.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An idea that you invented that belongs to you, for example an image you created is known as?
Distributed Data
Intellectual property
Industrial Espionage
Consumables
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Industrial espionage is...?
When a remote computer is attacked and made unable to respond to legitimate user requests.
A cyberattack that sends spam messages to try and trick people to reply with desired information.
A measure of effectiveness – how long it takes an employee to produce an item for sale.
Stealing private information from a company to benefit the organisations competitors
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Identify which of the following are motivations behind why systems are attacked. (Choose all that apply)
To increase the value of shares
To cause disruption
Challenge/Fun
To gain financially
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A personal attack is when
a remote computer attacks a system making it unable to respond to legitimate user requests
additional settings or program codes are used to fix vulnerabilities in a system.
someone,such as an ex employee attacks an organisation because they hold a grudge against the employer or organisation
sensitive personal information is obtained from a user by looking over their shoulder while they use a digital device.
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which type of system attack is most likely to lead to identity theft?
Industrial espionage
DOS attack
A ransomware attack
Data and information theft
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Inspire - AI Trivia
Quiz
•
11th Grade
15 questions
tik kelas 7
Quiz
•
1st Grade - University
10 questions
Empowerment Technologies Quiz 2
Quiz
•
11th Grade
10 questions
Unit 4 Advanced AP CSP
Quiz
•
9th - 12th Grade
10 questions
BÀI 8. SẮP XẾP VÀ LỌC DỮ LIỆU
Quiz
•
1st - 12th Grade
10 questions
Cyber Security
Quiz
•
1st - 10th Grade
15 questions
After Effect Intoduction
Quiz
•
10th Grade - University
14 questions
Linux: Users and Groups
Quiz
•
9th Grade - University
Popular Resources on Wayground
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
15 questions
Solving Equations with Variables on Both Sides Review
Quiz
•
8th Grade
