BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

10th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

Inspire - AI Trivia

Inspire - AI Trivia

11th Grade

10 Qs

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

1st - 10th Grade

10 Qs

tik kelas 7

tik kelas 7

1st Grade - University

15 Qs

Empowerment Technologies Quiz 2

Empowerment Technologies Quiz 2

11th Grade

10 Qs

Cyber Security

Cyber Security

1st - 10th Grade

10 Qs

8525 AQA GCSE  3.1.1 Pseudo-code

8525 AQA GCSE 3.1.1 Pseudo-code

10th - 11th Grade

14 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

Assessment

Quiz

Computers

10th - 11th Grade

Practice Problem

Medium

Created by

Sarah Rodgers

Used 175+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ransomware software do?

Steals information from your computer

Locks and encrypts your computer and asks for money

Robs you

Obtains sensitive information by shoulder surfing.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An idea that you invented that belongs to you, for example an image you created is known as?

Distributed Data

Intellectual property

Industrial Espionage

Consumables

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Industrial espionage is...?

When a remote computer is attacked and made unable to respond to legitimate user requests.

A cyberattack that sends spam messages to try and trick people to reply with desired information.

A measure of effectiveness – how long it takes an employee to produce an item for sale.

Stealing private information from a company to benefit the organisations competitors

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Identify which of the following are motivations behind why systems are attacked. (Choose all that apply)

To increase the value of shares

To cause disruption

Challenge/Fun

To gain financially

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A personal attack is when

a remote computer attacks a system making it unable to respond to legitimate user requests

additional settings or program codes are used to fix vulnerabilities in a system.

someone,such as an ex employee attacks an organisation because they hold a grudge against the employer or organisation

sensitive personal information is obtained from a user by looking over their shoulder while they use a digital device.

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which type of system attack is most likely to lead to identity theft?

Industrial espionage

DOS attack

A ransomware attack

Data and information theft

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?