Search Header Logo

Data Transmission & Wired connecting Devices

Authored by M E

Computers

Professional Development

Used 3+ times

Data Transmission & Wired connecting Devices
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organisation has found a keylogger has been installed on a system that is recording what employees are typing and sending it someone outside the organisation. What type of malware have they been infected with?

Viruses

Worms

Trojans

Spyware

Answer explanation

Spyware is a malicious program that monitors user activity for the purpose of stealing personal information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The organisation’s employees have been receiving a lot of emails that are requesting users enter private details into a web form. What threat is this?

Malware

Hacking

Phishing

Phishing Accidental Damage

Answer explanation

Phishing is where emails are sent purporting to be a reputable company but in fact have been sent by a malicious user for the purpose of gaining personal or financial information.

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are likely impacts of the threat identified in the previous question?

Data is deleted from the hard disk and cannot be recovered.

Bank details are accessed and used to steal money

Your network is overloaded with data and can no longer be used.

Login details are gained that can be used for a hack

Answer explanation

Phishing emails are usually used to gain access to private and confidential data, such as bank details, personal details or login details. This can then be used for bank fraud, identity fraud or unauthorised access to systems.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The organisation has noticed someone has been entering in hundreds of password combinations for a username. What type of hacking attack is this?

Rainbow Table

Phishing

Brute Force

Trojan

Answer explanation

This is where a hacker uses a program to generate a large number of consecutive guesses for a password to gain access to a system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If this individual gains access to the system what might the impact of this be?

The business could be blackmailed over releasing details of the hack.

Confidential data could be stolen and released online

Business data could be deleted from the system.

All of them

Answer explanation

Once a user has access to a system they can cause a wide range of harm. Theft, modification or deletion of data is common, as is blackmailing businesses

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are examples of accidental damage?

Overwriting sales records with your own sales.

Spilling liquid onto a device causing it to break.

Deleting unwanted data from the system.

Installing a virus on a computer after being fired.

Answer explanation

Deleting unwanted data or purposely installing a virus is obviously not accidental. However the others can do.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Amanda’s cat dropped a paperweight on her laptop and it no longer can startup. She had many important files and photos stored on the device. What are potential impacts of this for her?

Her system may become infected with malware as a result.

She will need to pay to replace/repair the device.

She may need to pay a specialist to recover the data.

The system will be easier for a malicious user to gain unauthorised access.

Answer explanation

There are many financial costs that can occur as a result of accidental damage. Another impact could be the stress caused to Amanda over the potential loss of important data or photos

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?