Threats to Data, Info & Systems

Threats to Data, Info & Systems

7th - 12th Grade

7 Qs

quiz-placeholder

Similar activities

cyber security

cyber security

9th Grade

11 Qs

Computational Thinking Quiz

Computational Thinking Quiz

7th Grade

10 Qs

IT Unit 11 Cyber Security Key Terms

IT Unit 11 Cyber Security Key Terms

11th - 12th Grade

10 Qs

Grade 9 quiz

Grade 9 quiz

9th Grade

10 Qs

cyber security Y9

cyber security Y9

9th Grade

10 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

BTEC DIT C3 LAB - Data Level Protection 1

BTEC DIT C3 LAB - Data Level Protection 1

10th - 11th Grade

10 Qs

BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

10th - 11th Grade

10 Qs

Threats to Data, Info & Systems

Threats to Data, Info & Systems

Assessment

Quiz

Computers

7th - 12th Grade

Medium

Created by

Ismael Nobre

Used 12+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organisation has found a keylogger has been installed on a system that is recording what employees are typing and sending it someone outside the organisation. What type of malware have they been infected with?

Viruses

Worms

Trojans

Spyware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The organisation’s employees have been receiving a lot of emails that are requesting users enter private details into a web form. What threat is this?

Malware

Hacking

Phishing

Accidental Damage

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which 2 of the following are likely impacts of the threat identified in the previous question?

Data is deleted from the hard disk and cannot be recovered.

Bank details are accessed and used to steal money.

Your network is overloaded with data and can no longer be used

Login details are gained that can be used for a hack.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The organisation has noticed someone has been entering in hundreds of password combinations for a username. What type of hacking attack is this?

Rainbow Table

Phishing

Brute Force

Trojan

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If this individual gains access to the system what might the impact of this be?

The business could be blackmailed over releasing details of the hack.

Confidential data could be stolen and released online.

Business data could be deleted from the system

All of the above.

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following 2 are examples of accidental damage?

Overwriting sales records with your own sales.

Spilling liquid onto a device causing it to break.

Deleting unwanted data from the system.

Installing a virus on a computer after being fired.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Hannah’s cat dropped a paperweight on her laptop and it no longer can startup. She had many important files and photos stored on the device. What are the 2 potential impacts of this for her?

Her system may become infected with malware as a result.

She will need to pay to replace/repair the device.

She may need to pay a specialist to recover the data.

The system will be easier for a malicious user to gain unauthorised access.