Test your knowledge with free interactive questions on Seneca — used by over 10 million students.

Forms of Attack

Attacks on networks come in different forms:

Insider attack

Insider attack

  • When someone in an organisation gives away access details or sensitive information.
Passive attack

Passive attack

  • When a hacker eavesdrops on a network by 'sniffing' the data packets.
Social engineering

Social engineering

  • When a person is exploited into giving away critical information that gives access to the network or accounts.
Active attack

Active attack

  • When someone uses malware or other technical methods to compromise a network's security.
Jump to other topics
1

Computer Systems

1.1

Systems Architecture

1.2

Memory & Storage

1.3

Computer Networks, Connections & Protocols

1.4

Network Security

1.5

Systems Software

1.6

Ethical, Legal, Cultural & Environmental Concern

2

Computational Thinking, Algorithms & Programming

2.1

Algorithms

2.2

Programming Fundamentals

2.3

Producing Robust Programs

2.4

Boolean Logic

2.5

Programming Languages & IDEs

Practice questions on Forms of Attack

Can you answer these? Test yourself with free interactive practice on Seneca — used by over 10 million students.

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
Answer all questions on Forms of Attack

Unlock your full potential with Seneca Premium

  • Unlimited access to 10,000+ open-ended exam questions

  • Mini-mock exams based on your study history

  • Unlock 800+ premium courses & e-books

Get started with Seneca Premium