Search Header Logo

BTEC DIT C3 LAB - Why Systems Are Attacked

Authored by Sarah Rodgers

Computers

10th - 11th Grade

Used 178+ times

BTEC DIT C3 LAB - Why Systems Are Attacked
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ransomware software do?

Steals information from your computer

Locks and encrypts your computer and asks for money

Robs you

Obtains sensitive information by shoulder surfing.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An idea that you invented that belongs to you, for example an image you created is known as?

Distributed Data

Intellectual property

Industrial Espionage

Consumables

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Industrial espionage is...?

When a remote computer is attacked and made unable to respond to legitimate user requests.

A cyberattack that sends spam messages to try and trick people to reply with desired information.

A measure of effectiveness – how long it takes an employee to produce an item for sale.

Stealing private information from a company to benefit the organisations competitors

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Identify which of the following are motivations behind why systems are attacked. (Choose all that apply)

To increase the value of shares

To cause disruption

Challenge/Fun

To gain financially

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A personal attack is when

a remote computer attacks a system making it unable to respond to legitimate user requests

additional settings or program codes are used to fix vulnerabilities in a system.

someone,such as an ex employee attacks an organisation because they hold a grudge against the employer or organisation

sensitive personal information is obtained from a user by looking over their shoulder while they use a digital device.

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which type of system attack is most likely to lead to identity theft?

Industrial espionage

DOS attack

A ransomware attack

Data and information theft

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?