Security Measures(Networks)

Beschreibung

GCSE Computing (Networks) Quiz am Security Measures(Networks), erstellt von Kwame Oteng-Adusei am 10/02/2016.
Kwame Oteng-Adusei
Quiz von Kwame Oteng-Adusei, aktualisiert more than 1 year ago
Kwame Oteng-Adusei
Erstellt von Kwame Oteng-Adusei vor fast 9 Jahre
10
0

Zusammenfassung der Ressource

Frage 1

Frage
Why the need for security measures in networks?
Antworten
  • Risk of illegal access by unauthorised users
  • To protect private files
  • Risk of control being transferred to a duplicate sytem

Frage 2

Frage
User [blank_start]Access[blank_end] Levels control who can access all the folders and files on a network [blank_start]server.[blank_end] Different groups of users can be [blank_start]assigned[blank_end] different rights, for example some may be able to read [blank_start]files[blank_end], while others can edit or delete them.
Antworten
  • Access
  • Dictation
  • files
  • python code
  • server.
  • CPU
  • assigned
  • signed

Frage 3

Frage
Strong Passwords ensure each user's account remains [blank_start]secure[blank_end]. They should be changed [blank_start]regularly[blank_end] and have different [blank_start]passwords[blank_end] for different sites. It should contain upper and lower case [blank_start]letters[blank_end], numbers and characters, but not user identifiable items e.g. [blank_start]date[blank_end] of birth, phone number.
Antworten
  • regularly
  • occassionally
  • rarely
  • letters
  • integers
  • passwords
  • encryptions
  • date
  • year
  • secure
  • changeable

Frage 4

Frage
Encryption converts [blank_start]data[blank_end] into a form that cannot be [blank_start]understood[blank_end] by unauthorised [blank_start]users[blank_end]. The message is encrypted with recipient's [blank_start]public[blank_end] key. The recipient [blank_start]decrypts[blank_end] it with their own private key.
Antworten
  • data
  • binary digits
  • users
  • peers
  • decrypts
  • incrypts
  • unlocks
  • public
  • private
  • understood
  • found
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Networks
Will8324
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
2.1.6 Networks
Lavington ICT
Connectivity
Karishma Chhatwal
Packets and Protocols
rwc.carlton