An organisation has found a keylogger has been installed on a system that is recording what employees are typing and sending it someone outside the organisation. What type of malware have they been infected with?
Threats to Data, Info & Systems

Quiz
•
Computers
•
7th - 12th Grade
•
Medium
Ismael Nobre
Used 12+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Viruses
Worms
Trojans
Spyware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The organisation’s employees have been receiving a lot of emails that are requesting users enter private details into a web form. What threat is this?
Malware
Hacking
Phishing
Accidental Damage
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which 2 of the following are likely impacts of the threat identified in the previous question?
Data is deleted from the hard disk and cannot be recovered.
Bank details are accessed and used to steal money.
Your network is overloaded with data and can no longer be used
Login details are gained that can be used for a hack.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The organisation has noticed someone has been entering in hundreds of password combinations for a username. What type of hacking attack is this?
Rainbow Table
Phishing
Brute Force
Trojan
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If this individual gains access to the system what might the impact of this be?
The business could be blackmailed over releasing details of the hack.
Confidential data could be stolen and released online.
Business data could be deleted from the system
All of the above.
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following 2 are examples of accidental damage?
Overwriting sales records with your own sales.
Spilling liquid onto a device causing it to break.
Deleting unwanted data from the system.
Installing a virus on a computer after being fired.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Hannah’s cat dropped a paperweight on her laptop and it no longer can startup. She had many important files and photos stored on the device. What are the 2 potential impacts of this for her?
Her system may become infected with malware as a result.
She will need to pay to replace/repair the device.
She may need to pay a specialist to recover the data.
The system will be easier for a malicious user to gain unauthorised access.
Similar Resources on Quizizz
10 questions
BTEC DIT C3 LAB - Security Policies & Disaster Recovery

Quiz
•
10th - 11th Grade
10 questions
Data Protection + Copyright

Quiz
•
8th Grade
12 questions
Computer Security

Quiz
•
7th - 10th Grade
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
12 questions
Data Protection Act 1988

Quiz
•
6th - 12th Grade
12 questions
Cyber Security Plan

Quiz
•
12th Grade
10 questions
BTEC DIT C3 LAC - Shared Data

Quiz
•
10th Grade
11 questions
Malware

Quiz
•
8th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
15 questions
June Review Quiz

Quiz
•
Professional Development
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade
Discover more resources for Computers
25 questions
SS Combined Advisory Quiz

Quiz
•
6th - 8th Grade
40 questions
Week 4 Student In Class Practice Set

Quiz
•
9th - 12th Grade
40 questions
SOL: ILE DNA Tech, Gen, Evol 2025

Quiz
•
9th - 12th Grade
20 questions
NC Universities (R2H)

Quiz
•
9th - 12th Grade
20 questions
Congruent and Similar Triangles

Quiz
•
8th Grade
25 questions
Triangle Inequalities

Quiz
•
10th - 12th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
10 questions
Right Triangles: Pythagorean Theorem and Trig

Quiz
•
11th Grade