
BTEC DIT C3 LAB - Why Systems Are Attacked
Authored by Sarah Rodgers
Computers
10th - 11th Grade
Used 178+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware is...
Malicious Software (Viruses, Trojans, Spyware)
Intercepting data when it is been sent
Taking down a website by flooding it with data and traffic
Gaining unauthorised access to a computer
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does ransomware software do?
Steals information from your computer
Locks and encrypts your computer and asks for money
Robs you
Obtains sensitive information by shoulder surfing.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An idea that you invented that belongs to you, for example an image you created is known as?
Distributed Data
Intellectual property
Industrial Espionage
Consumables
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Industrial espionage is...?
When a remote computer is attacked and made unable to respond to legitimate user requests.
A cyberattack that sends spam messages to try and trick people to reply with desired information.
A measure of effectiveness – how long it takes an employee to produce an item for sale.
Stealing private information from a company to benefit the organisations competitors
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Identify which of the following are motivations behind why systems are attacked. (Choose all that apply)
To increase the value of shares
To cause disruption
Challenge/Fun
To gain financially
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A personal attack is when
a remote computer attacks a system making it unable to respond to legitimate user requests
additional settings or program codes are used to fix vulnerabilities in a system.
someone,such as an ex employee attacks an organisation because they hold a grudge against the employer or organisation
sensitive personal information is obtained from a user by looking over their shoulder while they use a digital device.
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which type of system attack is most likely to lead to identity theft?
Industrial espionage
DOS attack
A ransomware attack
Data and information theft
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
conditional and iterative statements
Quiz
•
11th Grade
10 questions
Grade 11 Term 4 Practice 2
Quiz
•
11th Grade
9 questions
Los periféricos del computador
Quiz
•
1st Grade - Professio...
10 questions
Ce știm despre Internet?
Quiz
•
4th Grade - University
14 questions
Computing figures
Quiz
•
4th - 12th Grade
15 questions
CIW
Quiz
•
9th - 12th Grade
10 questions
Word basics
Quiz
•
8th - 12th Grade
12 questions
HTML
Quiz
•
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
14 questions
[AP CSP] JavaScript Programming Quiz
Quiz
•
9th - 12th Grade
10 questions
Understanding Computers and Computer Engineering
Interactive video
•
7th - 12th Grade
37 questions
Python - Tuples, Lists, and List Methods
Quiz
•
9th - 12th Grade