Internal and External threats to data

Internal and External threats to data

Assessment

Quiz

Computers

10th - 11th Grade

Practice Problem

Hard

Created by

Nick Wiecek

Used 33+ times

FREE Resource

Student preview

quiz-placeholder

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What does a DOS do?

Floods a server with requests causing it to go offline

Puts a virus file onto your computer

Gets users to share sensitive information through a false pretext.

It is action taken to fix something that has gone wrong.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A Man in the Middle Attack is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is phishing?

Is a type of malware disguised as legitimate programs.

Is obtaining sensitive information from a user by looking over their shoulder while they use digital machines

A cyber attack that sends spam messages to try and trick people to reply with the desired information.

An attack on a remote computer by making it unable to respond to legitimate user requests.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Hacking is...

Malicious Software (Viruses, Trojans, Spyware)

Intercepting data when it is been sent

Taking down a website by flooding it with data and traffic

Gaining unauthorised access to a computer

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What do we call a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.

Rootkit

Ransomware

Botnet

Trojan

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What do we call software that allows someone to maintain command and control over a computer without the computer user/owner knowing about it

Bug

Rootkit

Worm

Trojan Horse

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What do we call programs that contain additional functionality designed to secretly monitor your activities on your computer.

Spyware

Adware

Rootkit

Botnet

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers