Security Measures(Networks)

Description

GCSE Computing (Networks) Quiz on Security Measures(Networks), created by Kwame Oteng-Adusei on 10/02/2016.
Kwame Oteng-Adusei
Quiz by Kwame Oteng-Adusei, updated more than 1 year ago
Kwame Oteng-Adusei
Created by Kwame Oteng-Adusei almost 9 years ago
10
0

Resource summary

Question 1

Question
Why the need for security measures in networks?
Answer
  • Risk of illegal access by unauthorised users
  • To protect private files
  • Risk of control being transferred to a duplicate sytem

Question 2

Question
User [blank_start]Access[blank_end] Levels control who can access all the folders and files on a network [blank_start]server.[blank_end] Different groups of users can be [blank_start]assigned[blank_end] different rights, for example some may be able to read [blank_start]files[blank_end], while others can edit or delete them.
Answer
  • Access
  • Dictation
  • files
  • python code
  • server.
  • CPU
  • assigned
  • signed

Question 3

Question
Strong Passwords ensure each user's account remains [blank_start]secure[blank_end]. They should be changed [blank_start]regularly[blank_end] and have different [blank_start]passwords[blank_end] for different sites. It should contain upper and lower case [blank_start]letters[blank_end], numbers and characters, but not user identifiable items e.g. [blank_start]date[blank_end] of birth, phone number.
Answer
  • regularly
  • occassionally
  • rarely
  • letters
  • integers
  • passwords
  • encryptions
  • date
  • year
  • secure
  • changeable

Question 4

Question
Encryption converts [blank_start]data[blank_end] into a form that cannot be [blank_start]understood[blank_end] by unauthorised [blank_start]users[blank_end]. The message is encrypted with recipient's [blank_start]public[blank_end] key. The recipient [blank_start]decrypts[blank_end] it with their own private key.
Answer
  • data
  • binary digits
  • users
  • peers
  • decrypts
  • incrypts
  • unlocks
  • public
  • private
  • understood
  • found
Show full summary Hide full summary

Similar

Networks
Will8324
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
2.1.6 Networks
Lavington ICT
Connectivity
Karishma Chhatwal
Packets and Protocols
rwc.carlton