
Data Transmission & Wired connecting Devices
Authored by M E
Computers
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organisation has found a keylogger has been installed on a system that is recording what employees are typing and sending it someone outside the organisation. What type of malware have they been infected with?
Viruses
Worms
Trojans
Spyware
Answer explanation
Spyware is a malicious program that monitors user activity for the purpose of stealing personal information.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The organisation’s employees have been receiving a lot of emails that are requesting users enter private details into a web form. What threat is this?
Malware
Hacking
Phishing
Phishing Accidental Damage
Answer explanation
Phishing is where emails are sent purporting to be a reputable company but in fact have been sent by a malicious user for the purpose of gaining personal or financial information.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are likely impacts of the threat identified in the previous question?
Data is deleted from the hard disk and cannot be recovered.
Bank details are accessed and used to steal money
Your network is overloaded with data and can no longer be used.
Login details are gained that can be used for a hack
Answer explanation
Phishing emails are usually used to gain access to private and confidential data, such as bank details, personal details or login details. This can then be used for bank fraud, identity fraud or unauthorised access to systems.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The organisation has noticed someone has been entering in hundreds of password combinations for a username. What type of hacking attack is this?
Rainbow Table
Phishing
Brute Force
Trojan
Answer explanation
This is where a hacker uses a program to generate a large number of consecutive guesses for a password to gain access to a system
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
If this individual gains access to the system what might the impact of this be?
The business could be blackmailed over releasing details of the hack.
Confidential data could be stolen and released online
Business data could be deleted from the system.
All of them
Answer explanation
Once a user has access to a system they can cause a wide range of harm. Theft, modification or deletion of data is common, as is blackmailing businesses
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following are examples of accidental damage?
Overwriting sales records with your own sales.
Spilling liquid onto a device causing it to break.
Deleting unwanted data from the system.
Installing a virus on a computer after being fired.
Answer explanation
Deleting unwanted data or purposely installing a virus is obviously not accidental. However the others can do.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Amanda’s cat dropped a paperweight on her laptop and it no longer can startup. She had many important files and photos stored on the device. What are potential impacts of this for her?
Her system may become infected with malware as a result.
She will need to pay to replace/repair the device.
She may need to pay a specialist to recover the data.
The system will be easier for a malicious user to gain unauthorised access.
Answer explanation
There are many financial costs that can occur as a result of accidental damage. Another impact could be the stress caused to Amanda over the potential loss of important data or photos
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Soal SKD
Quiz
•
University - Professi...
15 questions
4.6.4 Logic Gates
Quiz
•
10th Grade - Professi...
10 questions
QUIZ Fun bersama Batch 5 Data Analtyc
Quiz
•
Professional Development
10 questions
beware of phishing
Quiz
•
Professional Development
10 questions
Què en saps de GSuite?
Quiz
•
University - Professi...
14 questions
Tin học 7 - ÔT Cuối kì 2 CĐ Bảng tính - Trình chiếu
Quiz
•
Professional Development
13 questions
Five Nights At Freddy's: Security Breach Quiz
Quiz
•
KG - Professional Dev...
16 questions
L4 Ôn tập HK 2 - 22-23
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
•
9th Grade
22 questions
fractions
Quiz
•
3rd Grade
11 questions
FOREST Effective communication
Lesson
•
KG
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
15 questions
LOTE_SPN2 5WEEK3 Day 2 Itinerary
Quiz
•
Professional Development
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
6 questions
Copy of G5_U6_L3_22-23
Lesson
•
KG - Professional Dev...
20 questions
Employability Skills
Quiz
•
Professional Development