BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

Chapter 3 Exploring Linux Filesystems

Chapter 3 Exploring Linux Filesystems

11th Grade - University

10 Qs

IP ADDRESSING AND ITS VERSION

IP ADDRESSING AND ITS VERSION

11th Grade

15 Qs

Parcial 1, Primera serie

Parcial 1, Primera serie

6th Grade - University

10 Qs

Examen final algoritmo

Examen final algoritmo

11th Grade

12 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Quizz Internet

Quizz Internet

KG - Professional Development

12 Qs

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

1st - 10th Grade

10 Qs

Empowerment Technologies Quiz 2

Empowerment Technologies Quiz 2

11th Grade

10 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

Assessment

Quiz

Computers

10th - 11th Grade

Hard

Created by

Sarah Rodgers

Used 623+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a DOS do?

Floods a server with requests causing it to go offline

Puts a virus file onto your computer

Gets users to share sensitive information through a false pretext.

It is action taken to fix something that has gone wrong.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Man in the Middle Attack is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Is a type of malware disguised as legitimate programs.

Is obtaining sensitive information from a user by looking over their shoulder while they use digital machines

A cyber attack that sends spam messages to try and trick people to reply with the desired information.

An attack on a remote computer by making it unable to respond to legitimate user requests.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.

Rootkit

Ransomware

Botnet

Trojan

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call software that allows someone to maintain command and control over a computer without the computer user/owner knowing about it

Bug

Rootkit

Worm

Trojan Horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call programs that contain additional functionality designed to secretly monitor your activities on your computer.

Spyware

Adware

Rootkit

Botnet

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?