
BTEC DIT C3 LAB - External Threats
Authored by Sarah Rodgers
Computers
10th - 11th Grade
Used 641+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a DOS do?
Floods a server with requests causing it to go offline
Puts a virus file onto your computer
Gets users to share sensitive information through a false pretext.
It is action taken to fix something that has gone wrong.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A Man in the Middle Attack is...
Malicious Software (Viruses, Trojans, Spyware)
Intercepting data when it is been sent
Taking down a website by flooding it with data and traffic
Gaining unauthorised access to a computer
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
Is a type of malware disguised as legitimate programs.
Is obtaining sensitive information from a user by looking over their shoulder while they use digital machines
A cyber attack that sends spam messages to try and trick people to reply with the desired information.
An attack on a remote computer by making it unable to respond to legitimate user requests.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Hacking is...
Malicious Software (Viruses, Trojans, Spyware)
Intercepting data when it is been sent
Taking down a website by flooding it with data and traffic
Gaining unauthorised access to a computer
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
Rootkit
Ransomware
Botnet
Trojan
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call software that allows someone to maintain command and control over a computer without the computer user/owner knowing about it
Bug
Rootkit
Worm
Trojan Horse
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do we call programs that contain additional functionality designed to secretly monitor your activities on your computer.
Spyware
Adware
Rootkit
Botnet
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
hardware and software(g3)
Quiz
•
2nd - 10th Grade
15 questions
Adivina quien?
Quiz
•
1st - 10th Grade
15 questions
Quis Grade 5
Quiz
•
9th - 12th Grade
10 questions
Bài 13-Bổ sung các đối tượng đồ hoạ
Quiz
•
10th Grade
15 questions
KD 3.1_Aplikasi Pengolah Angka / Spreadsheet
Quiz
•
10th Grade
10 questions
Microcontroller
Quiz
•
11th Grade - University
10 questions
TIN 11 - PYTHON - PHÉP TOÁN - BIỂU THỨC - CÂU LỆNH GÁN
Quiz
•
11th Grade
10 questions
Cos’è la ROM?
Quiz
•
6th - 12th Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
Exploring Valentine's Day with Charlie Brown
Interactive video
•
6th - 10th Grade
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
10 questions
Valentine's Day History and Traditions
Interactive video
•
6th - 10th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade
10 questions
Valentine's Day: History and Modern Celebration
Interactive video
•
9th - 12th Grade
11 questions
Valentine's Day Trivia
Quiz
•
8th - 12th Grade
10 questions
Elijah McCoy: Innovations and Impact in Black History
Interactive video
•
6th - 10th Grade