Computer Security

Beschreibung

Computer security
Mr A Esch
Quiz von Mr A Esch, aktualisiert more than 1 year ago
Mr A Esch
Erstellt von Mr A Esch vor mehr als 7 Jahre
811
6

Zusammenfassung der Ressource

Frage 1

Frage
The purpose of a firewall is to:
Antworten
  • Stop your computer from getting viruses.
  • Controlling which programs can send or receive data packets.
  • Blocking programs from the Internet
  • Protecting the computer from scary monsters.

Frage 2

Frage
Scanning your computer periodically using anti malware means to
Antworten
  • Scan the computer system for malware at set times (For example, once a week).
  • Making sure that you keep the malware software up to date.
  • Logging into your computer and clicking the "scan" button each time.
  • Scanning attachments from emails and downloads from websites.

Frage 3

Frage
"Enigma" and "Caesar" are both examples of
Antworten
  • Ciphers
  • Keys

Frage 4

Frage
What is needed for a computer to decrypt a message?
Antworten
  • Passcode
  • Key
  • Cipher
  • Email

Frage 5

Frage
How many characters should a password be?
Antworten
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10

Frage 6

Frage
Which of the following is the most secure password?
Antworten
  • Cabbages
  • greencabbages
  • MrEschHatesC@bBage5
  • mreschhatesgreencabbages

Frage 7

Frage
Worms, Viruses, Zombies and Trojan Horses are all examples of:
Antworten
  • Computer viruses
  • Malicious software (Malware)
  • Harmful data
  • Untrusted programs.

Frage 8

Frage
When anti malware software finds malware on your computer system,which statement best describes what happens next?
Antworten
  • The infected file will be sent to quarantine, so that it is isolated away from the rest of your files. You can then decide whether to delete or repair the file.
  • The anti malware software will delete the infected file instantly, along with any other files which are linked to it. This keeps the computer system safe and secure.
  • You will be told that you have malware and then have the option of deleting it.

Frage 9

Frage
Which Malware disguises itself as a useful program (e.g. a virus cleaner); however it actually sends viruses to your computer system?
Antworten
  • Trojan Horse
  • Zombie
  • Virus
  • Worm

Frage 10

Frage
Which malware replicates itself and spreads to other computers on a network?
Antworten
  • Worm
  • Zombie
  • Virus
  • Trojan Horse

Frage 11

Frage
Which malware attaches itself to a computer program and then replicates?
Antworten
  • Worm
  • Virus
  • Trojan Horse
  • Zombie

Frage 12

Frage
Which malware performs malicious tasks remotely from your computer system. Examples of this include email spam and Denial of service attacks (DOS).
Antworten
  • Worm
  • Virus
  • Trojan Horse
  • Zombie

Frage 13

Frage
Phishing emails attempt to:
Antworten
  • Obtain sensitive information such as usernames, passwords and bank details
  • Sell you multi-buy deals on a wide range of fish products, including salmon and tuna.
  • Send malicious software to your computer system in order to slow it down.
  • Fill your email inbox with spam.

Frage 14

Frage
Which of the following would not help you know whether a website is safe to enter data such as bank details, usernames and passwords?
Antworten
  • Checking for https:// and the padlock.
  • Reading a review website.
  • Checking the URL spelling to make sure that it looks genuine.
  • Not following "click bait" in emails which ask you for details (clicking on a link in an email).

Frage 15

Frage
Data sent and received over networks are called
Antworten
  • Crisp packets
  • Viruses
  • Data packets
  • Data

Frage 16

Frage
A business needs to use network security to:
Antworten
  • Keep customer and employee data safe.
  • Maintain a good reputation so that they do not lose profits.
  • Make sure that customers can trust the business.
  • All 3 points in this question.

Frage 17

Frage
Which security method prevents unauthorised access to your computer profile?
Antworten
  • Passwords
  • Encryption
  • Firewall
  • Anti malware

Frage 18

Frage
Which security method protects your computer from intruders?
Antworten
  • Firewall
  • Passwords
  • Encryption
  • Anti malware

Frage 19

Frage
Which security method protects your computer system from malware?
Antworten
  • Anti malware
  • Encryption
  • Passwords
  • Firewall

Frage 20

Frage
Which of the following is the most important to keep up to date?
Antworten
  • Firewall
  • Anti malware
  • Encryption
  • Passwords

Frage 21

Frage
Which of the following security methods protects your data packets from being read by unauthorised users?
Antworten
  • Firewall
  • Encryption
  • Passwords
  • Anti malware
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

encryption
Niamh Leigh
Certified Information Systems Security Professional (CISSP)
GoAsk Chaz
Hacking quiz
Luigi3106 YT
Utility software (firewalls and anti-virus)
Mr A Esch
security threats
jacob stenning
SSCP Domains
Abdul Issa
Computer Security Potential Flaws
Rob Speirs
Chapter 5: Keeping data safe and secure, keywords
Victoria Heppinstall
Utility software
Joshua Price