GCSE OCR Computing 1.4.1 - Threats to Computer Systems

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

10th Grade

10 Qs

quiz-placeholder

Similar activities

Password Hacking Techniques

Password Hacking Techniques

9th Grade - University

14 Qs

18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

9th - 12th Grade

11 Qs

L2 - Social Engineering  KS3

L2 - Social Engineering KS3

9th - 11th Grade

10 Qs

1.4 - Network Attacks

1.4 - Network Attacks

7th - 12th Grade

14 Qs

Identity Theft

Identity Theft

9th - 12th Grade

10 Qs

Cybersecurity Essentials Quiz

Cybersecurity Essentials Quiz

10th Grade

6 Qs

NETWORK SECURITY

NETWORK SECURITY

8th - 10th Grade

15 Qs

J277 Network Threats

J277 Network Threats

7th - 11th Grade

10 Qs

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Mr Loizou

Used 108+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is another name for "Malicious software" ?

Word processor

Malware

Baiting

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Roughly how many new viruses are made each day?

about 800

around 8,000

about 80,000

8 billion

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a type of virus that replicates itself, exploiting vulnerabilities in a network, but doesn't need to attach itself to a program>

trojan

snake

worm

phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of virus misleads the user to its intent, hiding inside another piece of software?

bait software

phishing

trojan horse

worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cleverly tricking users into revealing details which should be kept securely without using any malware or virus is called?

mechanical engineering

social electioneering

structural engineering

social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Falsely sending an email asking someone to log in to their bank and update their password due to a security breach, and then directing them to a fake website is...

perfectly acceptable

phishing

fishing

phish food

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does data travel across networks ?

in packets

in parcels

infrequently

on tiny bicycles

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?