Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our Cookie Policy
Accept
© eRevision.uk and ZigZag Education 2025
This test is run by .
Note that your final mark will not be saved in the system.

4.1 Threats MatchUp

Target Level
Pass
Running Total
0
0%
Attempt
1 of 3

Click on a top box, then click on its match below. Or, drag a top box and drop it onto the correct match. Match all pairs before clicking ‘Check’.

Spyware
Virus
Trojan Horse
Social engineering
Phishing
Legal form of hacking to improve security of a system
Illegal hacking of a system to steal data and carry out malicious activity
Hacking
Malware
Attempting to gain access to a computer system that you do not have permission to access
Software designed to deliberately steal data from or otherwise damage the computer system on which it is installed
Impersonating a trusted person or organisation in order to steal data or manipulate the users of a system
Manipulating the users of a system in order to steal data or gain unauthorised access
Software that collects data from a computer system
Malware that spreads by injecting its code into other files on the computer system
Malicious software allowing full control to a hacker
White hat hacker
Black hat hacker

This is your 1st attempt! You get 3 marks for each one you get right. Good luck!

Pass Mark
75%