
BTEC DIT C3 LAB - Why Systems Are Attacked
Authored by Sarah Rodgers
Computers
10th - 11th Grade
Used 178+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware is...
Malicious Software (Viruses, Trojans, Spyware)
Intercepting data when it is been sent
Taking down a website by flooding it with data and traffic
Gaining unauthorised access to a computer
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does ransomware software do?
Steals information from your computer
Locks and encrypts your computer and asks for money
Robs you
Obtains sensitive information by shoulder surfing.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An idea that you invented that belongs to you, for example an image you created is known as?
Distributed Data
Intellectual property
Industrial Espionage
Consumables
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Industrial espionage is...?
When a remote computer is attacked and made unable to respond to legitimate user requests.
A cyberattack that sends spam messages to try and trick people to reply with desired information.
A measure of effectiveness – how long it takes an employee to produce an item for sale.
Stealing private information from a company to benefit the organisations competitors
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Identify which of the following are motivations behind why systems are attacked. (Choose all that apply)
To increase the value of shares
To cause disruption
Challenge/Fun
To gain financially
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A personal attack is when
a remote computer attacks a system making it unable to respond to legitimate user requests
additional settings or program codes are used to fix vulnerabilities in a system.
someone,such as an ex employee attacks an organisation because they hold a grudge against the employer or organisation
sensitive personal information is obtained from a user by looking over their shoulder while they use a digital device.
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which type of system attack is most likely to lead to identity theft?
Industrial espionage
DOS attack
A ransomware attack
Data and information theft
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Dampak Sosial - X
Quiz
•
10th Grade
14 questions
4th quarter 2nd summative
Quiz
•
10th Grade
15 questions
App Inventor
Quiz
•
10th Grade
15 questions
Coding Quiz
Quiz
•
6th - 10th Grade
10 questions
Impresa e siti web
Quiz
•
8th - 12th Grade
10 questions
Recap: Introduction to Python
Quiz
•
10th Grade
15 questions
Learning Checkpoint 3: Primary & Secondary Storage
Quiz
•
9th - 10th Grade
15 questions
Class XI Basics
Quiz
•
11th - 12th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
Exploring Valentine's Day with Charlie Brown
Interactive video
•
6th - 10th Grade
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
10 questions
Valentine's Day History and Traditions
Interactive video
•
6th - 10th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Elijah McCoy: Innovations and Impact in Black History
Interactive video
•
6th - 10th Grade