Security Risks

Security Risks

10th Grade

15 Qs

quiz-placeholder

Similar activities

08 - Protecting Yourself QUIZ

08 - Protecting Yourself QUIZ

9th - 12th Grade

17 Qs

Ethical, Legal and Social Issues of Computing

Ethical, Legal and Social Issues of Computing

9th - 11th Grade

20 Qs

Security and Ethics

Security and Ethics

9th - 12th Grade

17 Qs

cyber security intro

cyber security intro

9th - 12th Grade

18 Qs

The Internet

The Internet

6th Grade - Professional Development

14 Qs

Cyber Security

Cyber Security

9th - 12th Grade

20 Qs

Security risk (Grade 11 IGCSE)

Security risk (Grade 11 IGCSE)

10th - 11th Grade

14 Qs

AQA GCSE Computer Science - 3.6.1 Security Terminology

AQA GCSE Computer Science - 3.6.1 Security Terminology

8th - 10th Grade

20 Qs

Security Risks

Security Risks

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Ella Eusebio

Used 46+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Program or program code that can replicate/copy itself with the intention of deleting or corrupting files, or cause the computer to malfunction.

Hacking

Phishing

Viruses

Pharming

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Software that gathers information by monitoring key presses on the user’s keyboard; the information is then sent back to the person who sent the software.

Viruses

Hacking

Pharming

Spyware/key logging software

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Malicious code installed on a user’s hard drive or on the web server; the code will redirect the user to a fake/bogus website without their knowledge.

Hacking

Viruses

Pharming

Phishing

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

•The act of gaining illegal access to a computer system.

Viruses

Hacking

Pharming

Phishing

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The creator sends out a legitimate-looking email; as soon as the recipient clicks on a link in the email/attachment, the user is sent to a fake/bogus website.

Viruses

Hacking

Pharming

Phishing

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The act of locating and using wireless internet connections illegally; it only requires a laptop (or other portable device), a wireless network card and an antenna to pick up wireless signals.

Viruses

Pharming

Wardriving

Spyware/key logger software

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of the following is NOT a security risk of Viruses?

This can lead to fraud or identity theft

Can delete files/data

Can corrupt files/data

Can cause the computer to crash, stop functioning normally or become unresponsive.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?