BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

10th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

Malware & Hacking

Malware & Hacking

10th Grade

14 Qs

Malware

Malware

7th - 11th Grade

15 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

J277 1.4 Network Security Quiz (Forms of Attack)

J277 1.4 Network Security Quiz (Forms of Attack)

9th - 12th Grade

13 Qs

Unit 3 System Hardening Quiz

Unit 3 System Hardening Quiz

10th Grade

15 Qs

Raas Cyber Security

Raas Cyber Security

7th Grade - Professional Development

15 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

Assessment

Quiz

Computers

10th - 11th Grade

Medium

Created by

Sarah Rodgers

Used 168+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ransomware software do?

Steals information from your computer

Locks and encrypts your computer and asks for money

Robs you

Obtains sensitive information by shoulder surfing.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An idea that you invented that belongs to you, for example an image you created is known as?

Distributed Data

Intellectual property

Industrial Espionage

Consumables

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Industrial espionage is...?

When a remote computer is attacked and made unable to respond to legitimate user requests.

A cyberattack that sends spam messages to try and trick people to reply with desired information.

A measure of effectiveness – how long it takes an employee to produce an item for sale.

Stealing private information from a company to benefit the organisations competitors

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Identify which of the following are motivations behind why systems are attacked. (Choose all that apply)

To increase the value of shares

To cause disruption

Challenge/Fun

To gain financially

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A personal attack is when

a remote computer attacks a system making it unable to respond to legitimate user requests

additional settings or program codes are used to fix vulnerabilities in a system.

someone,such as an ex employee attacks an organisation because they hold a grudge against the employer or organisation

sensitive personal information is obtained from a user by looking over their shoulder while they use a digital device.

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which type of system attack is most likely to lead to identity theft?

Industrial espionage

DOS attack

A ransomware attack

Data and information theft

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?