GCSE OCR Computing 1.4.1 - Threats to Computer Systems

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

10th Grade

10 Qs

quiz-placeholder

Similar activities

Cybersecurity

Cybersecurity

9th Grade - University

10 Qs

CSP 10-7 Security Risks

CSP 10-7 Security Risks

9th - 11th Grade

8 Qs

Cyber Security

Cyber Security

9th - 12th Grade

15 Qs

Understanding Potential Risks in Cybersecurity and Prevention Strategies

Understanding Potential Risks in Cybersecurity and Prevention Strategies

9th - 12th Grade

11 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

Computer & Internet Safety

Computer & Internet Safety

9th - 12th Grade

15 Qs

Unit 1 Quiz - What is Cybersecurity?

Unit 1 Quiz - What is Cybersecurity?

9th - 12th Grade

15 Qs

Data Transmission Security

Data Transmission Security

9th - 12th Grade

15 Qs

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

GCSE OCR Computing 1.4.1 - Threats to Computer Systems

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Mr Loizou

Used 108+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is another name for "Malicious software" ?

Word processor

Malware

Baiting

Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Roughly how many new viruses are made each day?

about 800

around 8,000

about 80,000

8 billion

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a type of virus that replicates itself, exploiting vulnerabilities in a network, but doesn't need to attach itself to a program>

trojan

snake

worm

phishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of virus misleads the user to its intent, hiding inside another piece of software?

bait software

phishing

trojan horse

worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cleverly tricking users into revealing details which should be kept securely without using any malware or virus is called?

mechanical engineering

social electioneering

structural engineering

social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Falsely sending an email asking someone to log in to their bank and update their password due to a security breach, and then directing them to a fake website is...

perfectly acceptable

phishing

fishing

phish food

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does data travel across networks ?

in packets

in parcels

infrequently

on tiny bicycles

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?