Threats to data

Threats to data

10th Grade

15 Qs

quiz-placeholder

Similar activities

General ICT Questions (Part 1)

General ICT Questions (Part 1)

5th - 12th Grade

20 Qs

IGCSE ICT Full Forms

IGCSE ICT Full Forms

9th - 10th Grade

16 Qs

GCSE 3.4 Computer systems - Hardware & Software

GCSE 3.4 Computer systems - Hardware & Software

9th - 11th Grade

19 Qs

Computer System Grade 9

Computer System Grade 9

9th - 10th Grade

15 Qs

AP CSP BI 4

AP CSP BI 4

9th - 12th Grade

12 Qs

Network and the Internet Quiz

Network and the Internet Quiz

9th - 12th Grade

15 Qs

CPU and Systems Software

CPU and Systems Software

10th - 11th Grade

11 Qs

AP CSP - Code.org Unit 3 Review

AP CSP - Code.org Unit 3 Review

9th - 12th Grade

15 Qs

Threats to data

Threats to data

Assessment

Quiz

Computers

10th Grade

Medium

IGCSE Computer Science

Standards-aligned

Created by

Lindsey Astbury

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware replicates itself across a network without needing a host program to be opened?

Spyware

Trojan Horse

Virus

Worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the aim of ransomware?

To encrypt data on a system and hold it hostage for ransom

To flood a user's computer with high volumes of adverts

To copy a credit or debit card that has a magnetic stripe

To observe what a user does with a computer and report back to its creator

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to avoid phishing attacks?

Share personal details with unknown sources

Click on unknown links in emails

Check sender's email address and tone of the email

Open attachments from unknown sources

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe software designed to observe what a user does with a computer and report back to its creator?

Spyware

Adware

Ransomware

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can card cloning be achieved by criminals?

By installing malware on a user's computer

By sending phishing emails to obtain card details

By using a skimmer to copy data from a card's magnetic stripe

By using a keylogger to record keystrokes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of phishing attacks?

To encrypt data on a system and hold it hostage for ransom

To copy a credit or debit card that has a magnetic stripe

To observe what a user does with a computer and report back to its creator

To obtain sensitive information such as usernames and passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a trojan horse malware?

To replicate itself across a network

To observe what a user does with a computer and report back to its creator

To disguise as legitimate software and cause harm to the system

To flood a user's computer with high volumes of adverts

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?