Lesson details

Key learning points

  1. In this lesson, we will learn about malware and the different categories of malware, as well as understanding how they work and the damage they can do.

Licence

This content is made available by Oak National Academy Limited and its partners and licensed under Oak’s terms & conditions (Collection 1), except where otherwise stated.

Loading...

5 Questions

Q1.
‘Gaining unauthorised access to or control of a computer system’ is a definition of which type of cybercrime?
DDoS attack
Correct answer: Hacking
Penetration testing
Social engineering
Q2.
What is the term for people who are paid to legally hack into computer systems with the sole purpose of helping a company identify weaknesses in their system?
Ethical hackers
Legal hackers
Correct answer: Penetration testers
System administrators
Q3.
What is the purpose of a DDoS attack?
To use a single computer to flood a network or server with internet traffic in order to disrupt service
To use a single computer to infiltrate a network in order to steal data or to plant a virus
Correct answer: To use multiple computers to flood a network or server with internet traffic in order to disrupt service
To use multiple computers to infiltrate a network in order to steal data or to plant a virus
Q4.
Which one of the following UK laws would a DDoS attack violate?
Correct answer: The Computer Misuse Act
The Copyright, Designs and Patents Act
The Data Protection Act
The Freedom of Information Act
Q5.
A hackers successfully hacks into a bank account and transfers money into another account whilst they are there. Which section of the Computer Misuse Act would this contravene?
Section 1
Correct answer: Section 2
Section 3

5 Questions

Q1.
Which of the following two are types of malware?
Anti-virus
Firewall
Correct answer: Trojan
Correct answer: Worm
Q2.
What is the definition of a computer virus?
Malicious software that disguises itself as something else
Malicious software that monitors every keystroke the user makes
Correct answer: Malicious software that self-replicates
Malicious software that uses network bandwidth to deliberately disrupt the speed of the network
Q3.
Which of the following statements best describes a "worm"?
Attaches to files and is designed to take up system resources to slow down the network or computer. Does not self replicate.
Malicious software that monitors every keystroke the user makes
Self replicates and encrypts files to make them inaccessible
Correct answer: Self replicates, does not attach to files, but is designed to take up system resources to slow down the network or computer
Q4.
The Wannacry virus was an example of which type of attack?
Brute force
DDoS
Correct answer: Ransomware
Spyware
Q5.
Which one of the following wouldn't an internet bot perform?
Brute force
DDoS attack
Finding new websites for search engines to index
Correct answer: Shouldering

Lesson appears in

UnitComputing / Cybersecurity

Computing