Securing Data & Systems WJEC GCSE CBAC

Securing Data & Systems WJEC GCSE CBAC

10th Grade

20 Qs

quiz-placeholder

Similar activities

1.2.1 Ram and Rom

1.2.1 Ram and Rom

10th - 11th Grade

15 Qs

GCSE Computing 1.2 Memory

GCSE Computing 1.2 Memory

10th Grade

20 Qs

GCSE Computer Science - Legal

GCSE Computer Science - Legal

9th - 11th Grade

25 Qs

DPA CMA

DPA CMA

10th - 12th Grade

15 Qs

Year 9 Cybersecurity assessment

Year 9 Cybersecurity assessment

10th Grade

25 Qs

Data Security

Data Security

9th - 10th Grade

15 Qs

Networking

Networking

9th - 11th Grade

21 Qs

Malware

Malware

7th - 10th Grade

22 Qs

Securing Data & Systems WJEC GCSE CBAC

Securing Data & Systems WJEC GCSE CBAC

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Stewart Roberts

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is meant by social engineering?

When cyber criminals take advantage of human behaviours without the

use of code to gain unauthorised access to sensitive data.

When cyber criminals take advantage of poor security to use basic code to gain unauthorised access to sensitive data.

When cyber criminals engineer the code to gain unauthorised access to sensitive data.

When cyber criminals take advantage of poor security to use advanced coding techniques to gain unauthorised access to sensitive data.

2.

REORDER QUESTION

1 min • 1 pt

Reorder the following to show the life cycle of a social engineering attack

remove all traces of the attack

Execute the attack

Identify the victim

Interact with the victim

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What type of social engineering attack is this?

Phishing

Trojan

Denial of service

Scareware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

A fraudulent technique where an internet user is tricked (an email

message is common) into revealing personal or confidential

information

A method of forcing users into denial of service therefore revealing login details

A type of wide scale attack that searches for login details in email inboxes

A fraudulent technique where an internet user is tricked using a coded script into revealing personal or confidential

information.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of language would you expect to see in a phishing email?

Pressuring, urgent demanding

Suggestive, polite, friendly

Formal, non urgent professional

Kind, helpful, endearing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing emails are normally addressed dear sir/madam and are not personal

TRUE

FALSE

7.

MATCH QUESTION

1 min • 1 pt

Match the following Social engineering attack methods

Shoulder Surfing

Attacks of this method use a false

promise to pique a victim's

greed or curiosity. They

lure users into a trap that

steals their personal

information or inflicts their

systems with malware.

Baiting

This method refers to the act of obtaining

personal or private

information through direct

observation.

Phishing

A fraudulent technique

where an internet user is

tricked (an email message is

common) into revealing

personal or confidential

information.

Blagging

This is when a criminal will

make up a scenario in order

to extract sensitive

information. This could be

done via email, over the

phone or even in person.

Scareware

Malicious computer

programs designed to trick a

user into buying and

downloading unnecessary

and potentially dangerous

software, such as fake

antivirus protection.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?