Threats to data

Threats to data

10th Grade

15 Qs

quiz-placeholder

Similar activities

Chapter 7: System life cycle

Chapter 7: System life cycle

9th - 11th Grade

15 Qs

INTRODUCCION A LA PROGRAMACION

INTRODUCCION A LA PROGRAMACION

6th Grade - University

10 Qs

Programming: Which Loop?

Programming: Which Loop?

9th - 12th Grade

20 Qs

Sains Komputer Tingkatan 5 - 1.3.1 Menerangkan get logik

Sains Komputer Tingkatan 5 - 1.3.1 Menerangkan get logik

1st Grade - Professional Development

20 Qs

Wifi y bluetooth

Wifi y bluetooth

10th Grade

10 Qs

QUIZ BAB 4: SISTEM OPERASI

QUIZ BAB 4: SISTEM OPERASI

8th Grade - University

20 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

Scratch

Scratch

9th - 10th Grade

19 Qs

Threats to data

Threats to data

Assessment

Quiz

Computers

10th Grade

Practice Problem

Medium

IGCSE Computer Science

Standards-aligned

Created by

Lindsey Astbury

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware replicates itself across a network without needing a host program to be opened?

Spyware

Trojan Horse

Virus

Worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the aim of ransomware?

To encrypt data on a system and hold it hostage for ransom

To flood a user's computer with high volumes of adverts

To copy a credit or debit card that has a magnetic stripe

To observe what a user does with a computer and report back to its creator

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to avoid phishing attacks?

Share personal details with unknown sources

Click on unknown links in emails

Check sender's email address and tone of the email

Open attachments from unknown sources

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term used to describe software designed to observe what a user does with a computer and report back to its creator?

Spyware

Adware

Ransomware

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can card cloning be achieved by criminals?

By installing malware on a user's computer

By sending phishing emails to obtain card details

By using a skimmer to copy data from a card's magnetic stripe

By using a keylogger to record keystrokes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of phishing attacks?

To encrypt data on a system and hold it hostage for ransom

To copy a credit or debit card that has a magnetic stripe

To observe what a user does with a computer and report back to its creator

To obtain sensitive information such as usernames and passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a trojan horse malware?

To replicate itself across a network

To observe what a user does with a computer and report back to its creator

To disguise as legitimate software and cause harm to the system

To flood a user's computer with high volumes of adverts

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?