Mr A Esch
Quiz by , created more than 1 year ago

Computer security

811
6
0
Mr A Esch
Created by Mr A Esch over 7 years ago
Close

Computer Security

Question 1 of 21

1

The purpose of a firewall is to:

Select one of the following:

  • Stop your computer from getting viruses.

  • Controlling which programs can send or receive data packets.

  • Blocking programs from the Internet

  • Protecting the computer from scary monsters.

Explanation

Question 2 of 21

1

Scanning your computer periodically using anti malware means to

Select one of the following:

  • Scan the computer system for malware at set times (For example, once a week).

  • Making sure that you keep the malware software up to date.

  • Logging into your computer and clicking the "scan" button each time.

  • Scanning attachments from emails and downloads from websites.

Explanation

Question 3 of 21

1

"Enigma" and "Caesar" are both examples of

Select one of the following:

  • Ciphers

  • Keys

Explanation

Question 4 of 21

1

What is needed for a computer to decrypt a message?

Select one of the following:

  • Passcode

  • Key

  • Cipher

  • Email

Explanation

Question 5 of 21

1

How many characters should a password be?

Select one of the following:

  • 5

  • 6

  • 7

  • 8

  • 9

  • 10

Explanation

Question 6 of 21

1

Which of the following is the most secure password?

Select one of the following:

  • Cabbages

  • greencabbages

  • MrEschHatesC@bBage5

  • mreschhatesgreencabbages

Explanation

Question 7 of 21

1

Worms, Viruses, Zombies and Trojan Horses are all examples of:

Select one of the following:

  • Computer viruses

  • Malicious software (Malware)

  • Harmful data

  • Untrusted programs.

Explanation

Question 8 of 21

1

When anti malware software finds malware on your computer system,which statement best describes what happens next?

Select one of the following:

  • The infected file will be sent to quarantine, so that it is isolated away from the rest of your files. You can then decide whether to delete or repair the file.

  • The anti malware software will delete the infected file instantly, along with any other files which are linked to it. This keeps the computer system safe and secure.

  • You will be told that you have malware and then have the option of deleting it.

Explanation

Question 9 of 21

1

Which Malware disguises itself as a useful program (e.g. a virus cleaner); however it actually sends viruses to your computer system?

Select one of the following:

  • Trojan Horse

  • Zombie

  • Virus

  • Worm

Explanation

Question 10 of 21

1

Which malware replicates itself and spreads to other computers on a network?

Select one of the following:

  • Worm

  • Zombie

  • Virus

  • Trojan Horse

Explanation

Question 11 of 21

1

Which malware attaches itself to a computer program and then replicates?

Select one of the following:

  • Worm

  • Virus

  • Trojan Horse

  • Zombie

Explanation

Question 12 of 21

1

Which malware performs malicious tasks remotely from your computer system. Examples of this include email spam and Denial of service attacks (DOS).

Select one of the following:

  • Worm

  • Virus

  • Trojan Horse

  • Zombie

Explanation

Question 13 of 21

1

Phishing emails attempt to:

Select one of the following:

  • Obtain sensitive information such as usernames, passwords and bank details

  • Sell you multi-buy deals on a wide range of fish products, including salmon and tuna.

  • Send malicious software to your computer system in order to slow it down.

  • Fill your email inbox with spam.

Explanation

Question 14 of 21

1

Which of the following would not help you know whether a website is safe to enter data such as bank details, usernames and passwords?

Select one of the following:

  • Checking for https:// and the padlock.

  • Reading a review website.

  • Checking the URL spelling to make sure that it looks genuine.

  • Not following "click bait" in emails which ask you for details (clicking on a link in an email).

Explanation

Question 15 of 21

1

Data sent and received over networks are called

Select one of the following:

  • Crisp packets

  • Viruses

  • Data packets

  • Data

Explanation

Question 16 of 21

1

A business needs to use network security to:

Select one of the following:

  • Keep customer and employee data safe.

  • Maintain a good reputation so that they do not lose profits.

  • Make sure that customers can trust the business.

  • All 3 points in this question.

Explanation

Question 17 of 21

1

Which security method prevents unauthorised access to your computer profile?

Select one of the following:

  • Passwords

  • Encryption

  • Firewall

  • Anti malware

Explanation

Question 18 of 21

1

Which security method protects your computer from intruders?

Select one of the following:

  • Firewall

  • Passwords

  • Encryption

  • Anti malware

Explanation

Question 19 of 21

1

Which security method protects your computer system from malware?

Select one of the following:

  • Anti malware

  • Encryption

  • Passwords

  • Firewall

Explanation

Question 20 of 21

1

Which of the following is the most important to keep up to date?

Select one of the following:

  • Firewall

  • Anti malware

  • Encryption

  • Passwords

Explanation

Question 21 of 21

1

Which of the following security methods protects your data packets from being read by unauthorised users?

Select one of the following:

  • Firewall

  • Encryption

  • Passwords

  • Anti malware

Explanation