Threats to data

Threats to data

10th Grade

15 Qs

quiz-placeholder

Similar activities

Computer Basics

Computer Basics

9th - 12th Grade

20 Qs

Malware & Hacking

Malware & Hacking

10th Grade

14 Qs

GCSE AQA CS - 06 Cyber Security

GCSE AQA CS - 06 Cyber Security

10th - 11th Grade

18 Qs

 Cybersecurity

Cybersecurity

9th - 12th Grade

20 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

software

software

9th - 12th Grade

20 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Malware

Malware

9th - 11th Grade

15 Qs

Threats to data

Threats to data

Assessment

Quiz

Computers

10th Grade

Medium

IGCSE Computer Science

Standards-aligned

Created by

Lindsey Astbury

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware replicates itself across a network without needing a host program to be opened?

Spyware

Trojan Horse

Virus

Worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the aim of ransomware?

To encrypt data on a system and hold it hostage for ransom

To flood a user's computer with high volumes of adverts

To copy a credit or debit card that has a magnetic stripe

To observe what a user does with a computer and report back to its creator

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to avoid phishing attacks?

Share personal details with unknown sources

Click on unknown links in emails

Check sender's email address and tone of the email

Open attachments from unknown sources

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe software designed to observe what a user does with a computer and report back to its creator?

Spyware

Adware

Ransomware

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can card cloning be achieved by criminals?

By installing malware on a user's computer

By sending phishing emails to obtain card details

By using a skimmer to copy data from a card's magnetic stripe

By using a keylogger to record keystrokes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of phishing attacks?

To encrypt data on a system and hold it hostage for ransom

To copy a credit or debit card that has a magnetic stripe

To observe what a user does with a computer and report back to its creator

To obtain sensitive information such as usernames and passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a trojan horse malware?

To replicate itself across a network

To observe what a user does with a computer and report back to its creator

To disguise as legitimate software and cause harm to the system

To flood a user's computer with high volumes of adverts

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?