Understanding the Threat to Digital Systems

Understanding the Threat to Digital Systems

10th Grade

20 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

9th - 12th Grade

18 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

Security & Authentication in ITGS

Security & Authentication in ITGS

10th - 12th Grade

21 Qs

BTEC IT Unit 1 - D1 Threats to data

BTEC IT Unit 1 - D1 Threats to data

10th - 12th Grade

15 Qs

(L2) 1.4 Network Security

(L2) 1.4 Network Security

10th Grade

19 Qs

MALWAE AND ANTIVIRUS

MALWAE AND ANTIVIRUS

9th - 10th Grade

15 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

WJEC GCSE Computer Science - Security

WJEC GCSE Computer Science - Security

9th - 10th Grade

18 Qs

Understanding the Threat to Digital Systems

Understanding the Threat to Digital Systems

Assessment

Quiz

Computers

10th Grade

Medium

Created by

James Evans

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of malware?

Firewall

Worm

Encryption

Backup

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of ransomware?

To encrypt files and demand payment for decryption

To log keystrokes

To overload a network with traffic

To steal passwords

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a Trojan differ from a virus?

A Trojan replicates itself while a virus does not

A Trojan disguises itself as legitimate software

A Trojan infects other files directly

A Trojan can only harm hardware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware records a user's keystrokes?

Spyware

Ransomware

Keylogger

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a technical vulnerability?

A user opening a phishing email

Using out-of-date anti-malware software

Forgetting a password

Sharing login credentials

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in the context of cybersecurity?

Exploiting technical vulnerabilities

Using manipulation to trick people into giving access

Developing new software tools

Encrypting data to protect it

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack method is based on social engineering?

Phishing

SQL injection

DDoS attack

Malware infection

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?