Search Header Logo

Year 12-Threats to Data, Information and Systems

Authored by Mihiri Ekanayake

Computers

11th Grade

Year 12-Threats to Data, Information and Systems
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a computer virus?

To disrupt systems and cause major operational issues

To monitor user actions

To encrypt files for ransom

To create a backdoor for remote access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between a virus and a worm?

A virus requires user action to spread, while a worm spreads automatically

A virus encrypts files, while a worm does not

A virus monitors user actions, while a worm does not

A virus is a type of spyware, while a worm is not

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main characteristic of a Trojan?

It encrypts files for ransom

It spreads without attaching to files

It disguises as legitimate software

It monitors user actions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ransomware do?

It monitors user actions

It encrypts files and demands a fee to unlock them

It spreads without attaching to files

It disguises as legitimate software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of a phishing attack?

To encrypt data

To gain physical access to a computer

To trick individuals into revealing sensitive information

To perform a denial of service attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes hacking?

Using software to back up data regularly

Gaining unauthorized access to computer systems or networks

Encrypting files to prevent data loss

Installing antivirus software on a device

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a potential consequence of a data breach for an organization?

Increased customer trust

Reduced need for cybersecurity measures

Financial loss and reputational damage

Faster system performance

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?