Unit 1 LAD - Implications and Protecting from Threats

Unit 1 LAD - Implications and Protecting from Threats

12th Grade

15 Qs

quiz-placeholder

Similar activities

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

Cyber Security

Cyber Security

12th Grade

10 Qs

POCS-Ch. 2 Review (Comprehension)

POCS-Ch. 2 Review (Comprehension)

7th - 12th Grade

20 Qs

Quis Sistem Keamanan Jaringan #2

Quis Sistem Keamanan Jaringan #2

12th Grade

20 Qs

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

Malware Types

Malware Types

12th Grade

15 Qs

040_An Overview of Malware – CompTIA Security+ SY0-701

040_An Overview of Malware – CompTIA Security+ SY0-701

9th Grade - University

20 Qs

Uji Pengetahuan Keamanan Siber

Uji Pengetahuan Keamanan Siber

9th Grade - University

15 Qs

Unit 1 LAD - Implications and Protecting from Threats

Unit 1 LAD - Implications and Protecting from Threats

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Godalming College

Used 9+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

You discover that some software you downloaded for defragmenting your disk has secretly been recording all of your keystrokes. What two categories of malware does this come under?

Worm

Trojan

Spyware

Virus

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What's the name of a hacking method that involves a program automatically going through multiple passwords to gain access to a computer system?

DDoS Attack

Trojan Attack

Phishing

Brute Force Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

"White hat hackers illegally hack computer systems for money, a political agenda, disruption or any other malicious purpose." True or false?

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following is a potential impact of accidental damage?

Devices like laptops and PCs may need to be replaced

Important organisational data may be lost, such as sales records

Personal data may be lost, such as photos with emotional value

All of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following descriptions is 'phishing'?

Using phone calls or emails to pose as a legitimate business or organisation to trick users into giving up sensitive information

Utilising a program to quickly try multiple passwords to gain access to a computer system

Using malware that looks like it is legitimate software, tricking other uses into downloading which allows the malware onto their system

The act of operating a fishing rod or other fishing instrument by a body of water to catch fish, either for food or as a sport

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Your friend has just told you that they fell for a phishing attempt. What are the possible implications of this? Pick 2 options.

The attacker may have access to their bank account and steal their money

The attacker can now upload malware directly to your friend's device

The attacker could use your friend's personal details to commit identity fraud

The attacker could delete all of your friend's files on their device

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

Which of the following descriptions describes a 'differential backup'?

Only data that has changed since the previous backup is backed up

A full backup of all your data is made

A full backup of all your data is made, then data that has changed since the previous back up are also backed up

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?