Search Header Logo

threats to computer systems and networks

Authored by Mackenzie Caldeira15

Computers

9th Grade

Used 8+ times

threats to computer systems and networks
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

It is a type of attack where the invader uses available resources, such as passwords or scripts, to gain access to and run programs designed to vandalize

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

It is a type of attack where the Invaders uses code to access operating systems, networks or software of a company.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Users outside an organization who do not have authorized access to the network or resources of the company.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A local or restricted communications network, especially a private network created using World Wide Web software

blended threats

trojan horse

intranet

back doors

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define what is meant by 'shouldering'

People as the 'weak point' in secure systems

Software that is harmful to a computer netwok

Legitimate looking emails, with a sense of urgency, that try and get your personal information

When someone looks overy your shoulder to ger information, like your pin at an ATM

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define what is meant by 'ransomware'

Software that spies on what you're doing and then passes it across the internet.

Software that is used to bribe an organisation in to paying a sum of money, otherwise the software will disrupt their network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Self replicating virus that does not alter files but resides in active memory and duplicates itself

worm

virus

spyware

trojan horse

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?