placeholder image to represent content

Higher Security Risks

Quiz by Mr Smith

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
21 questions
Show answers
  • Q1
    Computer software which is installed without the user's knowledge and may gather information about that user's internet browsing habits, intercept their personal data, and transmit this information to a third party.
    Spyware
    30s
  • Q2
    A type of software which pretends to be useful but secretly performs other functions such as spying on user habits.
    Trojan horse
    30s
  • Q3
    A type of software that can be legitimate or malicious.
    Adware
    30s
  • Q4
    Text files containing information about user browsing habits such as websites visited, products viewed etc.
    Cookies
    30s
  • Q5
    Cookies can be classed as malicious or?
    Legitimate
    30s
  • Q6
    Cookies that are designed to send as much data as possible to 3rd parties, and are known to be malicious are called?
    Tracking cookies
    30s
  • Q7
    Tracking cookie have led to incidences of?
    Personal identity theft
    30s
  • Q8
    Cookies can be managed using?
    Browser settings
    30s
  • Q9
    An attempt to prevent network users accessing network resources is called a?
    Denial of Service (DoS) attack
    30s
  • Q10
    A Denial of Service attack that is carried out using multiple infected devices over the internet is called a?
    Distributed Denial of Service (DDoS) attack
    30s
  • Q11
    A network of infected machines that are used to execute a DDoS attack is know as?
    A Botnet
    30s
  • Q12
    The following are examples of? *Slow performance when loggin intoa web-based system *slow network performance in greneral *inability to access a website
    Symptoms of a DoS attack
    30s
  • Q13
    The following are examples of? *loss of income *repair costs to bring sfoftware and efficiency back to a pre-attack level
    Costs incurred due to a of DoS attacks
    30s
  • Q14
    When a DoS attack is used to overload a server of single system by sending too many data packets/requests, this is said to be an attack affecting?
    Bandwidth consumption
    30s
  • Q15
    When a DoS attack is used to use up system resources such as processors and main memory, the effect is known as?
    Resource starvation
    30s

Teachers give this quiz to your class