threats to computer systems and networks

threats to computer systems and networks

9th Grade

15 Qs

quiz-placeholder

Similar activities

Základní části počítače a ergonomie

Základní části počítače a ergonomie

9th - 10th Grade

16 Qs

Network Security

Network Security

9th - 11th Grade

10 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Empowerment Technologies

Empowerment Technologies

KG - 12th Grade

15 Qs

LA1.C1: Introduction to Small Basic

LA1.C1: Introduction to Small Basic

9th Grade

15 Qs

أنظمة التشغيل

أنظمة التشغيل

9th Grade

12 Qs

WJEC GCSE ICT Unit 1 E-Mail

WJEC GCSE ICT Unit 1 E-Mail

9th - 10th Grade

13 Qs

Kuis Pengayaan (Aplikasi Sehari-hari?

Kuis Pengayaan (Aplikasi Sehari-hari?

9th Grade

10 Qs

threats to computer systems and networks

threats to computer systems and networks

Assessment

Quiz

Computers

9th Grade

Practice Problem

Hard

Created by

Mackenzie Caldeira15

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

It is a type of attack where the invader uses available resources, such as passwords or scripts, to gain access to and run programs designed to vandalize

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

It is a type of attack where the Invaders uses code to access operating systems, networks or software of a company.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Users outside an organization who do not have authorized access to the network or resources of the company.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A local or restricted communications network, especially a private network created using World Wide Web software

blended threats

trojan horse

intranet

back doors

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define what is meant by 'shouldering'

People as the 'weak point' in secure systems

Software that is harmful to a computer netwok

Legitimate looking emails, with a sense of urgency, that try and get your personal information

When someone looks overy your shoulder to ger information, like your pin at an ATM

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define what is meant by 'ransomware'

Software that spies on what you're doing and then passes it across the internet.

Software that is used to bribe an organisation in to paying a sum of money, otherwise the software will disrupt their network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Self replicating virus that does not alter files but resides in active memory and duplicates itself

worm

virus

spyware

trojan horse

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?