Security Risks

Security Risks

10th Grade

15 Qs

quiz-placeholder

Similar activities

Network Security - Phishing & Social Engineering

Network Security - Phishing & Social Engineering

8th - 11th Grade

11 Qs

Basic Network

Basic Network

10th Grade

16 Qs

AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

8th - 10th Grade

20 Qs

Network Threats

Network Threats

9th - 12th Grade

16 Qs

ITGS: 1.02 Security and 1.05 Authenticity

ITGS: 1.02 Security and 1.05 Authenticity

9th - 12th Grade

12 Qs

Cyber Security

Cyber Security

9th - 11th Grade

13 Qs

Cybersecurity Online Threats

Cybersecurity Online Threats

9th - 12th Grade

12 Qs

8.3 Security of data (1)

8.3 Security of data (1)

9th - 12th Grade

15 Qs

Security Risks

Security Risks

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Ella Eusebio

Used 47+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Program or program code that can replicate/copy itself with the intention of deleting or corrupting files, or cause the computer to malfunction.

Hacking

Phishing

Viruses

Pharming

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Software that gathers information by monitoring key presses on the user’s keyboard; the information is then sent back to the person who sent the software.

Viruses

Hacking

Pharming

Spyware/key logging software

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Malicious code installed on a user’s hard drive or on the web server; the code will redirect the user to a fake/bogus website without their knowledge.

Hacking

Viruses

Pharming

Phishing

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

•The act of gaining illegal access to a computer system.

Viruses

Hacking

Pharming

Phishing

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The creator sends out a legitimate-looking email; as soon as the recipient clicks on a link in the email/attachment, the user is sent to a fake/bogus website.

Viruses

Hacking

Pharming

Phishing

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The act of locating and using wireless internet connections illegally; it only requires a laptop (or other portable device), a wireless network card and an antenna to pick up wireless signals.

Viruses

Pharming

Wardriving

Spyware/key logger software

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a security risk of Viruses?

This can lead to fraud or identity theft

Can delete files/data

Can corrupt files/data

Can cause the computer to crash, stop functioning normally or become unresponsive.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?