Mr A Esch
Quiz por , criado more than 1 year ago

Computer security

813
6
0
Mr A Esch
Criado por Mr A Esch quase 8 anos atrás
Fechar

Computer Security

Questão 1 de 21

1

The purpose of a firewall is to:

Selecione uma das seguintes:

  • Stop your computer from getting viruses.

  • Controlling which programs can send or receive data packets.

  • Blocking programs from the Internet

  • Protecting the computer from scary monsters.

Explicação

Questão 2 de 21

1

Scanning your computer periodically using anti malware means to

Selecione uma das seguintes:

  • Scan the computer system for malware at set times (For example, once a week).

  • Making sure that you keep the malware software up to date.

  • Logging into your computer and clicking the "scan" button each time.

  • Scanning attachments from emails and downloads from websites.

Explicação

Questão 3 de 21

1

"Enigma" and "Caesar" are both examples of

Selecione uma das seguintes:

  • Ciphers

  • Keys

Explicação

Questão 4 de 21

1

What is needed for a computer to decrypt a message?

Selecione uma das seguintes:

  • Passcode

  • Key

  • Cipher

  • Email

Explicação

Questão 5 de 21

1

How many characters should a password be?

Selecione uma das seguintes:

  • 5

  • 6

  • 7

  • 8

  • 9

  • 10

Explicação

Questão 6 de 21

1

Which of the following is the most secure password?

Selecione uma das seguintes:

  • Cabbages

  • greencabbages

  • MrEschHatesC@bBage5

  • mreschhatesgreencabbages

Explicação

Questão 7 de 21

1

Worms, Viruses, Zombies and Trojan Horses are all examples of:

Selecione uma das seguintes:

  • Computer viruses

  • Malicious software (Malware)

  • Harmful data

  • Untrusted programs.

Explicação

Questão 8 de 21

1

When anti malware software finds malware on your computer system,which statement best describes what happens next?

Selecione uma das seguintes:

  • The infected file will be sent to quarantine, so that it is isolated away from the rest of your files. You can then decide whether to delete or repair the file.

  • The anti malware software will delete the infected file instantly, along with any other files which are linked to it. This keeps the computer system safe and secure.

  • You will be told that you have malware and then have the option of deleting it.

Explicação

Questão 9 de 21

1

Which Malware disguises itself as a useful program (e.g. a virus cleaner); however it actually sends viruses to your computer system?

Selecione uma das seguintes:

  • Trojan Horse

  • Zombie

  • Virus

  • Worm

Explicação

Questão 10 de 21

1

Which malware replicates itself and spreads to other computers on a network?

Selecione uma das seguintes:

  • Worm

  • Zombie

  • Virus

  • Trojan Horse

Explicação

Questão 11 de 21

1

Which malware attaches itself to a computer program and then replicates?

Selecione uma das seguintes:

  • Worm

  • Virus

  • Trojan Horse

  • Zombie

Explicação

Questão 12 de 21

1

Which malware performs malicious tasks remotely from your computer system. Examples of this include email spam and Denial of service attacks (DOS).

Selecione uma das seguintes:

  • Worm

  • Virus

  • Trojan Horse

  • Zombie

Explicação

Questão 13 de 21

1

Phishing emails attempt to:

Selecione uma das seguintes:

  • Obtain sensitive information such as usernames, passwords and bank details

  • Sell you multi-buy deals on a wide range of fish products, including salmon and tuna.

  • Send malicious software to your computer system in order to slow it down.

  • Fill your email inbox with spam.

Explicação

Questão 14 de 21

1

Which of the following would not help you know whether a website is safe to enter data such as bank details, usernames and passwords?

Selecione uma das seguintes:

  • Checking for https:// and the padlock.

  • Reading a review website.

  • Checking the URL spelling to make sure that it looks genuine.

  • Not following "click bait" in emails which ask you for details (clicking on a link in an email).

Explicação

Questão 15 de 21

1

Data sent and received over networks are called

Selecione uma das seguintes:

  • Crisp packets

  • Viruses

  • Data packets

  • Data

Explicação

Questão 16 de 21

1

A business needs to use network security to:

Selecione uma das seguintes:

  • Keep customer and employee data safe.

  • Maintain a good reputation so that they do not lose profits.

  • Make sure that customers can trust the business.

  • All 3 points in this question.

Explicação

Questão 17 de 21

1

Which security method prevents unauthorised access to your computer profile?

Selecione uma das seguintes:

  • Passwords

  • Encryption

  • Firewall

  • Anti malware

Explicação

Questão 18 de 21

1

Which security method protects your computer from intruders?

Selecione uma das seguintes:

  • Firewall

  • Passwords

  • Encryption

  • Anti malware

Explicação

Questão 19 de 21

1

Which security method protects your computer system from malware?

Selecione uma das seguintes:

  • Anti malware

  • Encryption

  • Passwords

  • Firewall

Explicação

Questão 20 de 21

1

Which of the following is the most important to keep up to date?

Selecione uma das seguintes:

  • Firewall

  • Anti malware

  • Encryption

  • Passwords

Explicação

Questão 21 de 21

1

Which of the following security methods protects your data packets from being read by unauthorised users?

Selecione uma das seguintes:

  • Firewall

  • Encryption

  • Passwords

  • Anti malware

Explicação