GCSE OCR Computing 1.4.1 - Threats to Computer Systems

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

10th Grade

10 Qs

quiz-placeholder

Similar activities

Quiz Perkakas Teknologi Digital

Quiz Perkakas Teknologi Digital

10th Grade

14 Qs

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

BÀI KIỂM TRA GIỮA KÌ 2 LỚP 5

1st - 10th Grade

10 Qs

Cyber Security

Cyber Security

1st - 10th Grade

10 Qs

8525 AQA GCSE  3.1.1 Pseudo-code

8525 AQA GCSE 3.1.1 Pseudo-code

10th - 11th Grade

14 Qs

Mengoperasikan Website

Mengoperasikan Website

10th Grade

10 Qs

TMK  TAHUN 4

TMK TAHUN 4

10th Grade

10 Qs

After Effect Intoduction

After Effect Intoduction

10th Grade - University

15 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Mr Loizou

Used 113+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is another name for "Malicious software" ?

Word processor

Malware

Baiting

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Roughly how many new viruses are made each day?

about 800

around 8,000

about 80,000

8 billion

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a type of virus that replicates itself, exploiting vulnerabilities in a network, but doesn't need to attach itself to a program>

trojan

snake

worm

phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of virus misleads the user to its intent, hiding inside another piece of software?

bait software

phishing

trojan horse

worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cleverly tricking users into revealing details which should be kept securely without using any malware or virus is called?

mechanical engineering

social electioneering

structural engineering

social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Falsely sending an email asking someone to log in to their bank and update their password due to a security breach, and then directing them to a fake website is...

perfectly acceptable

phishing

fishing

phish food

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does data travel across networks ?

in packets

in parcels

infrequently

on tiny bicycles

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?