
BTEC IT Unit 1 - D threats to data & laws
Authored by Louise Lockwood
Computers
11th - 12th Grade
Used 124+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
•A ******* is a type of malware
•It is a standalone program that does need to attach itself to an existing program in order to spread
Virus
Trojan Horse
WAN
Worm
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
•may open a “back door” into your computer system through which your personal information can be harvested.
•It can also use your computer power and network bandwidth to send thousands of spam emails to others.
Virus
Trojan Horse
WAN
Worm
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Spyware is software that gathers information about a person or organisation without their knowledge?
True
False
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which is NOT illegal
Virus
DDos
Trojan Horse
Adware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is ransomware?
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is a trojan horse sneaky?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?