Security Measures(Networks)

Descripción

GCSE (Networks) Computing Test sobre Security Measures(Networks), creado por Kwame Oteng-Adusei el 10/02/2016.
Kwame Oteng-Adusei
Test por Kwame Oteng-Adusei, actualizado hace más de 1 año
Kwame Oteng-Adusei
Creado por Kwame Oteng-Adusei hace casi 9 años
10
0

Resumen del Recurso

Pregunta 1

Pregunta
Why the need for security measures in networks?
Respuesta
  • Risk of illegal access by unauthorised users
  • To protect private files
  • Risk of control being transferred to a duplicate sytem

Pregunta 2

Pregunta
User [blank_start]Access[blank_end] Levels control who can access all the folders and files on a network [blank_start]server.[blank_end] Different groups of users can be [blank_start]assigned[blank_end] different rights, for example some may be able to read [blank_start]files[blank_end], while others can edit or delete them.
Respuesta
  • Access
  • Dictation
  • files
  • python code
  • server.
  • CPU
  • assigned
  • signed

Pregunta 3

Pregunta
Strong Passwords ensure each user's account remains [blank_start]secure[blank_end]. They should be changed [blank_start]regularly[blank_end] and have different [blank_start]passwords[blank_end] for different sites. It should contain upper and lower case [blank_start]letters[blank_end], numbers and characters, but not user identifiable items e.g. [blank_start]date[blank_end] of birth, phone number.
Respuesta
  • regularly
  • occassionally
  • rarely
  • letters
  • integers
  • passwords
  • encryptions
  • date
  • year
  • secure
  • changeable

Pregunta 4

Pregunta
Encryption converts [blank_start]data[blank_end] into a form that cannot be [blank_start]understood[blank_end] by unauthorised [blank_start]users[blank_end]. The message is encrypted with recipient's [blank_start]public[blank_end] key. The recipient [blank_start]decrypts[blank_end] it with their own private key.
Respuesta
  • data
  • binary digits
  • users
  • peers
  • decrypts
  • incrypts
  • unlocks
  • public
  • private
  • understood
  • found
Mostrar resumen completo Ocultar resumen completo

Similar

Networks
Will8324
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
2.1.6 Networks
Lavington ICT
Connectivity
Karishma Chhatwal
Packets and Protocols
rwc.carlton