5.3.1 Protecting Data

5.3.1 Protecting Data

10th Grade

19 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz 3

Cybersecurity Quiz 3

10th Grade

15 Qs

Hardware vs. Software Quiz

Hardware vs. Software Quiz

7th - 10th Grade

20 Qs

LANs, WANs & Network Performance (Mr I's) [OCR 1.4 - Networks)

LANs, WANs & Network Performance (Mr I's) [OCR 1.4 - Networks)

9th - 11th Grade

21 Qs

APCSP IOC-2.C Cybersecurity Threats

APCSP IOC-2.C Cybersecurity Threats

9th - 12th Grade

15 Qs

GCSE AQA CS - 06 Cyber Security

GCSE AQA CS - 06 Cyber Security

10th - 11th Grade

18 Qs

Cyber Security

Cyber Security

8th - 12th Grade

20 Qs

basic Ict skill

basic Ict skill

10th Grade

15 Qs

System vs Application Software

System vs Application Software

9th - 12th Grade

17 Qs

5.3.1 Protecting Data

5.3.1 Protecting Data

Assessment

Quiz

Computers

10th Grade

Medium

Created by

P Bailey

Used 11+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware otherwise known as?

Malpractice software

Maltreating software

Malicious software

Maligning software

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following malware replicates itself to destroy data and files on a computer?

Worm

Spyware

Trojan horse

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following malware is designed to access a computer by misleading users into installing it, thinking it is something else?

Keylogger

Trojan horse

Virus

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does social engineering rely on?

Tricking users into breaking security procedures

Insecure networks of a computer system

Technical cracking techniques

Infecting existing files

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of an acceptable user policy?

Only tell users what they should do on a network.

Tell users what they should and should not do on a network

Only tell users what they should not do on a network

Stop users from having fun.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of social engineering?

Virus

Blagging (pretexting)

Worm

Spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following describes Phishing?

Collecting sensitive data through detailed searches using a search engine.

Extracting the most harmful virus from a computer

Collecting sensitive data through creating links to fake websites

Gaining access to passwords by watching users type them in.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?