threats to computer systems and networks

threats to computer systems and networks

9th Grade

15 Qs

quiz-placeholder

Similar activities

Network Security

Network Security

9th Grade

13 Qs

Network Security

Network Security

9th Grade

12 Qs

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

Malware

Malware

9th - 11th Grade

15 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

Cyber Security

Cyber Security

8th - 12th Grade

20 Qs

Network Quiz

Network Quiz

9th Grade

20 Qs

Cybersecurity Review

Cybersecurity Review

9th - 12th Grade

14 Qs

threats to computer systems and networks

threats to computer systems and networks

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Mackenzie Caldeira15

Used 8+ times

FREE Resource

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

It is a type of attack where the invader uses available resources, such as passwords or scripts, to gain access to and run programs designed to vandalize

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

It is a type of attack where the Invaders uses code to access operating systems, networks or software of a company.

3.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Users outside an organization who do not have authorized access to the network or resources of the company.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A local or restricted communications network, especially a private network created using World Wide Web software

blended threats

trojan horse

intranet

back doors

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define what is meant by 'shouldering'

People as the 'weak point' in secure systems

Software that is harmful to a computer netwok

Legitimate looking emails, with a sense of urgency, that try and get your personal information

When someone looks overy your shoulder to ger information, like your pin at an ATM

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Define what is meant by 'ransomware'

Software that spies on what you're doing and then passes it across the internet.

Software that is used to bribe an organisation in to paying a sum of money, otherwise the software will disrupt their network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Self replicating virus that does not alter files but resides in active memory and duplicates itself

worm

virus

spyware

trojan horse

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?