BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Fundamentals Week 3 Quiz

Cybersecurity Fundamentals Week 3 Quiz

KG - University

10 Qs

Cybersecurity and Malware Quiz

Cybersecurity and Malware Quiz

10th Grade

10 Qs

GCSE Computing 1.7 Operating Systems #1

GCSE Computing 1.7 Operating Systems #1

10th - 11th Grade

10 Qs

Malware

Malware

9th - 11th Grade

15 Qs

Week2 Quiz - Maleware types

Week2 Quiz - Maleware types

11th Grade

10 Qs

Cyber Security

Cyber Security

9th - 12th Grade

15 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

Assessment

Quiz

Computers

10th - 11th Grade

Hard

Created by

Sarah Rodgers

Used 602+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a DOS do?

Floods a server with requests causing it to go offline

Puts a virus file onto your computer

Gets users to share sensitive information through a false pretext.

It is action taken to fix something that has gone wrong.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Man in the Middle Attack is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Is a type of malware disguised as legitimate programs.

Is obtaining sensitive information from a user by looking over their shoulder while they use digital machines

A cyber attack that sends spam messages to try and trick people to reply with the desired information.

An attack on a remote computer by making it unable to respond to legitimate user requests.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacking is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.

Rootkit

Ransomware

Botnet

Trojan

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call software that allows someone to maintain command and control over a computer without the computer user/owner knowing about it

Bug

Rootkit

Worm

Trojan Horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do we call programs that contain additional functionality designed to secretly monitor your activities on your computer.

Spyware

Adware

Rootkit

Botnet

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?