Year 12-Threats to Data, Information and Systems

Year 12-Threats to Data, Information and Systems

11th Grade

7 Qs

quiz-placeholder

Similar activities

Computer Quiz 2

Computer Quiz 2

6th - 12th Grade

11 Qs

BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

10th - 11th Grade

10 Qs

BTEC DIT C3 LAB - External Threats

BTEC DIT C3 LAB - External Threats

10th - 11th Grade

10 Qs

Malware [OCR Computer Science]

Malware [OCR Computer Science]

9th - 11th Grade

8 Qs

Understanding Malware and Social Engineering

Understanding Malware and Social Engineering

10th Grade - University

10 Qs

Computer Malware

Computer Malware

6th - 12th Grade

10 Qs

Malware Quiz

Malware Quiz

9th - 12th Grade

10 Qs

10C - SQL, Malware & Viruses

10C - SQL, Malware & Viruses

9th - 11th Grade

12 Qs

Year 12-Threats to Data, Information and Systems

Year 12-Threats to Data, Information and Systems

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Mihiri Ekanayake

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a computer virus?

To disrupt systems and cause major operational issues

To monitor user actions

To encrypt files for ransom

To create a backdoor for remote access

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between a virus and a worm?

A virus requires user action to spread, while a worm spreads automatically

A virus encrypts files, while a worm does not

A virus monitors user actions, while a worm does not

A virus is a type of spyware, while a worm is not

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main characteristic of a Trojan?

It encrypts files for ransom

It spreads without attaching to files

It disguises as legitimate software

It monitors user actions

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ransomware do?

It monitors user actions

It encrypts files and demands a fee to unlock them

It spreads without attaching to files

It disguises as legitimate software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the goal of a phishing attack?

To encrypt data

To gain physical access to a computer

To trick individuals into revealing sensitive information

To perform a denial of service attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes hacking?

Using software to back up data regularly

Gaining unauthorized access to computer systems or networks

Encrypting files to prevent data loss

Installing antivirus software on a device

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a potential consequence of a data breach for an organization?

Increased customer trust

Reduced need for cybersecurity measures

Financial loss and reputational damage

Faster system performance