Search Header Logo

Threats to data

Authored by Lindsey Astbury

Computers

10th Grade

IGCSE Computer Science covered

Used 2+ times

Threats to data
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware replicates itself across a network without needing a host program to be opened?

Spyware

Trojan Horse

Virus

Worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the aim of ransomware?

To encrypt data on a system and hold it hostage for ransom

To flood a user's computer with high volumes of adverts

To copy a credit or debit card that has a magnetic stripe

To observe what a user does with a computer and report back to its creator

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to avoid phishing attacks?

Share personal details with unknown sources

Click on unknown links in emails

Check sender's email address and tone of the email

Open attachments from unknown sources

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe software designed to observe what a user does with a computer and report back to its creator?

Spyware

Adware

Ransomware

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can card cloning be achieved by criminals?

By installing malware on a user's computer

By sending phishing emails to obtain card details

By using a skimmer to copy data from a card's magnetic stripe

By using a keylogger to record keystrokes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of phishing attacks?

To encrypt data on a system and hold it hostage for ransom

To copy a credit or debit card that has a magnetic stripe

To observe what a user does with a computer and report back to its creator

To obtain sensitive information such as usernames and passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a trojan horse malware?

To replicate itself across a network

To observe what a user does with a computer and report back to its creator

To disguise as legitimate software and cause harm to the system

To flood a user's computer with high volumes of adverts

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?