
BTEC DIT C3 LAB - External Threats
Authored by Sarah Rodgers
Computers
10th - 11th Grade
Used 650+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a DOS do?
Floods a server with requests causing it to go offline
Puts a virus file onto your computer
Gets users to share sensitive information through a false pretext.
It is action taken to fix something that has gone wrong.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Man in the Middle Attack is...
Malicious Software (Viruses, Trojans, Spyware)
Intercepting data when it is been sent
Taking down a website by flooding it with data and traffic
Gaining unauthorised access to a computer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
Is a type of malware disguised as legitimate programs.
Is obtaining sensitive information from a user by looking over their shoulder while they use digital machines
A cyber attack that sends spam messages to try and trick people to reply with the desired information.
An attack on a remote computer by making it unable to respond to legitimate user requests.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hacking is...
Malicious Software (Viruses, Trojans, Spyware)
Intercepting data when it is been sent
Taking down a website by flooding it with data and traffic
Gaining unauthorised access to a computer
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
Rootkit
Ransomware
Botnet
Trojan
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call software that allows someone to maintain command and control over a computer without the computer user/owner knowing about it
Bug
Rootkit
Worm
Trojan Horse
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call programs that contain additional functionality designed to secretly monitor your activities on your computer.
Spyware
Adware
Rootkit
Botnet
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?