Higher Security Risks
Quiz by Mr Smith
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
21 questions
Show answers
- Q1Computer software which is installed without the user's knowledge and may gather information about that user's internet browsing habits, intercept their personal data, and transmit this information to a third party.Spyware30s
- Q2A type of software which pretends to be useful but secretly performs other functions such as spying on user habits.Trojan horse30s
- Q3A type of software that can be legitimate or malicious.Adware30s
- Q4Text files containing information about user browsing habits such as websites visited, products viewed etc.Cookies30s
- Q5Cookies can be classed as malicious or?Legitimate30s
- Q6Cookies that are designed to send as much data as possible to 3rd parties, and are known to be malicious are called?Tracking cookies30s
- Q7Tracking cookie have led to incidences of?Personal identity theft30s
- Q8Cookies can be managed using?Browser settings30s
- Q9An attempt to prevent network users accessing network resources is called a?Denial of Service (DoS) attack30s
- Q10A Denial of Service attack that is carried out using multiple infected devices over the internet is called a?Distributed Denial of Service (DDoS) attack30s
- Q11A network of infected machines that are used to execute a DDoS attack is know as?A Botnet30s
- Q12The following are examples of? *Slow performance when loggin intoa web-based system *slow network performance in greneral *inability to access a websiteSymptoms of a DoS attack30s
- Q13The following are examples of? *loss of income *repair costs to bring sfoftware and efficiency back to a pre-attack levelCosts incurred due to a of DoS attacks30s
- Q14When a DoS attack is used to overload a server of single system by sending too many data packets/requests, this is said to be an attack affecting?Bandwidth consumption30s
- Q15When a DoS attack is used to use up system resources such as processors and main memory, the effect is known as?Resource starvation30s