
Unit 1 LAD - Implications and Protecting from Threats

Quiz
•
Computers
•
12th Grade
•
Medium
Godalming College
Used 9+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
You discover that some software you downloaded for defragmenting your disk has secretly been recording all of your keystrokes. What two categories of malware does this come under?
Worm
Trojan
Spyware
Virus
2.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
What's the name of a hacking method that involves a program automatically going through multiple passwords to gain access to a computer system?
DDoS Attack
Trojan Attack
Phishing
Brute Force Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
"White hat hackers illegally hack computer systems for money, a political agenda, disruption or any other malicious purpose." True or false?
True
False
4.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following is a potential impact of accidental damage?
Devices like laptops and PCs may need to be replaced
Important organisational data may be lost, such as sales records
Personal data may be lost, such as photos with emotional value
All of the above
5.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following descriptions is 'phishing'?
Using phone calls or emails to pose as a legitimate business or organisation to trick users into giving up sensitive information
Utilising a program to quickly try multiple passwords to gain access to a computer system
Using malware that looks like it is legitimate software, tricking other uses into downloading which allows the malware onto their system
The act of operating a fishing rod or other fishing instrument by a body of water to catch fish, either for food or as a sport
6.
MULTIPLE SELECT QUESTION
45 sec • 5 pts
Your friend has just told you that they fell for a phishing attempt. What are the possible implications of this? Pick 2 options.
The attacker may have access to their bank account and steal their money
The attacker can now upload malware directly to your friend's device
The attacker could use your friend's personal details to commit identity fraud
The attacker could delete all of your friend's files on their device
7.
MULTIPLE CHOICE QUESTION
30 sec • 5 pts
Which of the following descriptions describes a 'differential backup'?
Only data that has changed since the previous backup is backed up
A full backup of all your data is made
A full backup of all your data is made, then data that has changed since the previous back up are also backed up
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Studio - U3 LO1 - 1.1 Cyber Security Aims

Quiz
•
12th Grade
20 questions
Cybersecurity2

Quiz
•
12th Grade
14 questions
YEAR 9 UNIT 1 COMPUTERS L3 - EXIT PASS

Quiz
•
8th Grade - University
10 questions
Network Security

Quiz
•
9th - 12th Grade
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
10 questions
1.2.2 1.2.3 1.2.4 Cybersecurity

Quiz
•
9th - 12th Grade
15 questions
Ancaman Siber dan Keamanannya

Quiz
•
12th Grade
12 questions
Cyber Security Plan

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade