BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

11th Grade

11 Qs

quiz-placeholder

Similar activities

Among Us SKELD Quiz

Among Us SKELD Quiz

3rd Grade - Professional Development

11 Qs

J808 LO4.1.4 Hacking, 5 DDOS, 6 Pharming

J808 LO4.1.4 Hacking, 5 DDOS, 6 Pharming

10th - 11th Grade

15 Qs

ONLINE SAFETY

ONLINE SAFETY

11th Grade

15 Qs

Hiểu biết về công nghệ thông tin cơ bản

Hiểu biết về công nghệ thông tin cơ bản

8th Grade - University

12 Qs

HTTP protocol and Privacy on the web

HTTP protocol and Privacy on the web

9th - 12th Grade

12 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

CLO Computing: Ethical, Legal & Environmental

CLO Computing: Ethical, Legal & Environmental

9th - 11th Grade

10 Qs

Network Transmission Media

Network Transmission Media

10th Grade - Professional Development

8 Qs

BTEC DIT C3 B1 - Threats to Data

BTEC DIT C3 B1 - Threats to Data

Assessment

Quiz

Computers

11th Grade

Practice Problem

Medium

Created by

J Sharp

Used 52+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"They enjoy the risk involved in attacking systems and want the notoriety that comes with it"

Which of these reasons for systems being attacked match the statement above?

Disruption

Personal Attack

Personal fun and challenge

Financial Gain

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone whose primary motivation to hack is for personal or financial gain"

Which type of hacker is this?

Black Hat

Grey Hat

White Hat

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone who looks for vulnerabilities in a system without the owners permission or consent"

Which type of hacker suits this description the best ?

Black Hat

Grey Hat

White Hat

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

"Someone who hacks for good, they may be hired by a company to find flaws in their systems"

Which type of hacker does this description match the best?

Black Hat

Grey Hat

White Hat

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware which locks computers on a network and demands money in return for handing control back

Worm

Rootkit

Trojan

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Gathers information about the user without their knowledge, this can include private information such as passwords and banking details through keylogging

Spyware

Ransomware

Trojan

Botnet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Tricking users into giving their private information, typically done via phone or email by posing as a trustworthy company is known as...

Pharming

Social Engineering

Man-in-the-middle

Shoulder Surfing

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?