BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

11th Grade

11 Qs

quiz-placeholder

Similar activities

Dampak Sosial Informatika

Dampak Sosial Informatika

11th Grade

10 Qs

Javascript Lists Lecture Knowledge Check

Javascript Lists Lecture Knowledge Check

9th - 12th Grade

11 Qs

IT R050: Uses of Computers

IT R050: Uses of Computers

11th - 12th Grade

10 Qs

Bảo mật mạng

Bảo mật mạng

11th Grade

10 Qs

A BBC micro:bit

A BBC micro:bit

3rd - 12th Grade

10 Qs

Riviosn_internet threats & computer system

Riviosn_internet threats & computer system

9th - 12th Grade

13 Qs

POCS-Ch2.1 (Vocab)

POCS-Ch2.1 (Vocab)

7th - 12th Grade

10 Qs

J808 LO4.1.1 Botnets

J808 LO4.1.1 Botnets

11th Grade

10 Qs

BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

Assessment

Quiz

Computers

11th Grade

Medium

Created by

J Sharp

Used 52+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"They enjoy the risk involved in attacking systems and want the notoriety that comes with it"

Which of these reasons for systems being attacked match the statement above?

Disruption

Personal Attack

Personal fun and challenge

Financial Gain

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone whose primary motivation to hack is for personal or financial gain"

Which type of hacker is this?

Black Hat

Grey Hat

White Hat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone who looks for vulnerabilities in a system without the owners permission or consent"

Which type of hacker suits this description the best ?

Black Hat

Grey Hat

White Hat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone who hacks for good, they may be hired by a company to find flaws in their systems"

Which type of hacker does this description match the best?

Black Hat

Grey Hat

White Hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware which locks computers on a network and demands money in return for handing control back

Worm

Rootkit

Trojan

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gathers information about the user without their knowledge, this can include private information such as passwords and banking details through keylogging

Spyware

Ransomware

Trojan

Botnet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tricking users into giving their private information, typically done via phone or email by posing as a trustworthy company is known as...

Pharming

Social Engineering

Man-in-the-middle

Shoulder Surfing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?