An organisation has found a keylogger has been installed on a system that is recording what employees are typing and sending it someone outside the organisation. What type of malware have they been infected with?
Threats to Data, Info & Systems

Quiz
•
Computers
•
7th - 12th Grade
•
Medium
Ismael Nobre
Used 12+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Viruses
Worms
Trojans
Spyware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The organisation’s employees have been receiving a lot of emails that are requesting users enter private details into a web form. What threat is this?
Malware
Hacking
Phishing
Accidental Damage
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which 2 of the following are likely impacts of the threat identified in the previous question?
Data is deleted from the hard disk and cannot be recovered.
Bank details are accessed and used to steal money.
Your network is overloaded with data and can no longer be used
Login details are gained that can be used for a hack.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The organisation has noticed someone has been entering in hundreds of password combinations for a username. What type of hacking attack is this?
Rainbow Table
Phishing
Brute Force
Trojan
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If this individual gains access to the system what might the impact of this be?
The business could be blackmailed over releasing details of the hack.
Confidential data could be stolen and released online.
Business data could be deleted from the system
All of the above.
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following 2 are examples of accidental damage?
Overwriting sales records with your own sales.
Spilling liquid onto a device causing it to break.
Deleting unwanted data from the system.
Installing a virus on a computer after being fired.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Hannah’s cat dropped a paperweight on her laptop and it no longer can startup. She had many important files and photos stored on the device. What are the 2 potential impacts of this for her?
Her system may become infected with malware as a result.
She will need to pay to replace/repair the device.
She may need to pay a specialist to recover the data.
The system will be easier for a malicious user to gain unauthorised access.
Similar Resources on Quizizz
10 questions
BTEC DIT C3 LAA - Choosing Cloud Technologies

Quiz
•
10th - 11th Grade
10 questions
Exploring Technology Systems Quiz

Quiz
•
12th Grade - University
10 questions
Understanding Malware and Social Engineering

Quiz
•
10th Grade - University
10 questions
BTEC DIT C3 LAB - Data Level Protection 1

Quiz
•
10th - 11th Grade
10 questions
BTEC DIT C3 LAB - Why Systems Are Attacked

Quiz
•
10th - 11th Grade
10 questions
Cambridge Technical Unit 3 LO1

Quiz
•
11th Grade
12 questions
AP CSP Unit 8 Review

Quiz
•
11th Grade
11 questions
Cloud Computing

Quiz
•
KG - Professional Dev...
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
11 questions
Decimal/fraction conversions quick check

Quiz
•
5th - 7th Grade